Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (205)
  • News (3)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 ... 21 Next »

64%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
when you switch from permissive to enforcing mode. Once that happens, SELinux actively begins preventing services from doing things they shouldn't, on the basis of the policy configuration provided ... SELinux can provide protection from exploits that could compromise your system – if you know how to set it up and use it. We show you how to solve some commonly encountered problems.
63%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
, and it lets users interact with the Windows desktop using multi-touch support. The interface offers an on-screen trackpad for mousing and provides a secure connection to Windows PC over WiFi or 3G. Text input
63%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
are working together to provide the Classmate+ PC, a ruggedized laptop to handle the most challenging environment in IT – schools. The Classmate+ is an Atom-based 10.1-inch clamshell computer with Windows 7
61%
Operating system virtualization with OpenVZ
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© sculpies, Fotolia.com
then isolates the containers from one another and provides resources, such as CPU cycles, memory, and disk capacity (Figure 1). Figure 1: In virtualization based ... The virtualization technology market is currently concentrating on hypervisor-based systems, but hosting providers often use an alternative technology. Container-based solutions such as Open
61%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
icon lets you modify the individual services. You could use the services, for example, to set up FTP servers accessible via dynamic DNS or to provide shares for a variety of operating systems ... Set up your own network attached storage system with minimum effort with the help of FreeNAS. Thanks to the ZFS filesystem, you have more flexible storage, which you can also provide via iSCSI.
61%
Acceptable Risk
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Andrew Brown, 123RF.com
secret and to maintain a high level of personal security: locking their laptops, preventing over-the-shoulder spying, using a secure VPN connection, keeping anti-virus programs up-to-date, and leaving
60%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
as a managed service that are accessible remotely on a variety of clients, including desktop systems, laptops, and even the iPad. However, the platform can be a bit tricky to spec out, so VMware is providing
60%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
@antiphishing.org . You can download and read the complete report at: http://www.apwg.org/index.html. Dell to Deliver Ubuntu Laptop Dell has announced
60%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
of a new application, the system will evict caches as required to provide working memory for the new process – the illusion of free memory is preserved, even though those chips were most likely hard at work
59%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
be used for this, and communication with the client is handled by classic PAM and NSS interfaces. Different security providers are then on the back end to handle, for example, communications with an LDAP

« Previous 1 2 3 4 5 6 7 8 9 ... 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice