Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (583)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 71 Next »

7%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
_filecache`.`storage` AND ((`share_type` in ('0', '2') AND `share_with` = 'username@switch.ch') ) AND `uid_owner` != 'username@switch.ch' ORDER BY `oc_share`.`id` ASC 07 0.040 | INSERT INTO `oc_preferences` (`userid`, `appid
7%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
itself. Problem 2 goes hand in hand with this challenge: From an admin's point of view, it is not enough to restart the crashed container – that is not possible on the host system once it is gone. Most
7%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
In the history of wireless networks, many innovations have already been exaggerated by providers as a major breakthrough yet, in the end, did not really meet the expectations of users. In the case
7%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
requests from the Internet access to the corporate network. Depending on the size of your environment, firewalls can also isolate different departments. In addition to a fixed set of rules, a NIDS can use
7%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
-plugins The following NEW packages will be installed: auditd libauparse0 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Need to get 253 kB of archives. After this operation, 833 kB of additional disk
7%
Alternatives to Google Analytics
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Vasilii Shestakov, 123RF.com
: http://www.histats.com/?SETLANG=0 Stetic: https://www.crunchbase.com/organization/stetic#/entity
7%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
just two nodes: test1, which is the master node, and n0001, which is the first compute node): [laytonjb@test1 ~]$ pdsh -w test1,n0001 uptime test1: 18:57:17 up 2:40, 5 users, load average: 0.00, 0
6%
Containers made simple
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Nathan Cima on Unsplash
case is preferable for workloads in which only individual applications are in container form. When it comes to cloud-native applications, on the other hand, you are usually dealing with a large number
6%
Scalable mail storage with Dovecot and Amazon S3
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
://Accesskey:Secret@\ Bucket-Name.s3.amazonaws.com/ } Figure 2: The Dovecot website provides a PDF file that describes how to set up the enterprise repository and the S3 ... Admins can solve typical mail server scalability problems with Dovecot’s Amazon S3 plugin and the Ceph distributed object store. ... Dovecot and S3 ... Scalable mail storage with Dovecot and Amazon S3
6%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
is then given a new shell from jamesvb1 , which DNS identifies as s1.stangernet.com . Figure 8: The attacking system. Figures 9 and 10 show another sequence

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice