Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 37 Next »

78%
Offshoring and the Great Layoff
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Daniil Peshkov, 123RF.com
, prosperity, and normal attrition exist. What doesn't make sense to me is that technology is still here, no matter what. The work still needs to be done. Services need maintenance, hardware needs to be replaced
78%
News for Admins
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
is the Red Hat Advanced Cluster Management tool, which provides the ability to manage a fleet of OpenShift clusters. For more information about RHEL 8.3, read the official release notes (https://access.redhat.com
78%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
. The disadvantage of hardware appliances is that they are less flexible than software, which you can adapt to suit your own landscape. Cuckoo [3] was launched in August 2010, and the release candidate for version 2
78%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
about CPU utilization on Linux machines. Many of them use uptime or w, which, as I've illustrated, aren't the best ways to determine CPU utilization, particularly if testing an HPC application that uses
78%
Two-factor authentication for WordPress blogs
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Les Cunliffe, 123RF.com
. The key is very practical because it emulates a USB keyboard and is identified by the PC as such. In other words, you don't need a special driver – assuming your computer supports USB keyboards. If the USB ... 3
78%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
compiling (Listing 2). Listing 2 Sheepdog Uses the FNV-1a Algorithm 01 #define FNV1A_64_INIT ((uint64_t) 0xcbf29ce484222325ULL) 02 #define FNV_64_PRIME ((uint64_t) 0x100000001b3ULL) 03 04
78%
Into the Cloud for Security
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Tomasz Pacyna, 123RF.com
, and provide you with some intriguing new ransomware? And all of it looks like normal activity to your anti-malware suite. This isn't FUD, my friends, it's real. Once you've been through such a breach, it's hard ... I still remember the day in the not too distant past when someone told me that Linux wasn't allowed on the network.
77%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
collaborative software project. Zuul 3 is currently in use by multiple international companies (e.g., BMW, Software Factory, and, of course, OpenStack Foundation). In all cases, Zuul has proved to be a reliable ... The Zuul 3 gating system is a free and flexible solution for continuous integration, delivery, and deployment. ... Zuul 3 ... Zuul 3, a modern solution for CI/CD
77%
Integrating a Linux system with Active Directory
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Francesco Gallarotti on Unsplash
synchronization (e.g., Ubuntu uses the default NTP server at ntp.ubuntu.com ). No timing differences can exist between the Ubuntu machine and the Active Directory controller, so you can't use an external timing ... Your Active Directory system doesn't have to be a walled garden. A few easy steps are all you need to integrate Linux with AD.
77%
DNS name resolution with HTTPS
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by saeed karimi on Unsplash
the question of trusting or mistrusting your own Internet provider; associations that provide protection against censorship [1] or offer data protection [2]; or large DNS providers such as Cloudflare [3], Google

« Previous 1 2 3 4 5 6 7 8 9 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice