Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (262)
  • Article (79)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 38 Next »

6%
News for Admins
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
 
of an extra layer, named Seccomp. This new profile helps to prevent CVE and zero-day vulnerabilities and is enabled with the SeccompDefault option. Another new addition is the ability to leave swap on. Prior
6%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
your cluster's configuration profiles and the configurations of the virtual switches automatically. If not, you can run a backup manually or automate it with your own tools. Use the following commands
6%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
practical because these keys are already distributed in many places. Especially in the developer environment, you will find many public SSH keys in profiles on GitHub or GitLab. Unlike GnuPG, however, when
6%
Drush vs. Drupal Console
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © iofoto, fotolia.com
, form alters, rules, field formatters, etc. Plus, it's not limited to just generating modules. You can create themes and install profiles as well. Drupal Console is truly impressive. Kudos
6%
News for Admins
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
 
a goof. If you don't patch the software running on your website, don't be surprised if a hacker compromises your system and makes off with your customer's data." This is the second high-profile break
6%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
the C-TIP service to look for active botnets. The MARS project has already played a role in discovering several high-profile botnets, and the new C-TIP service adds a powerful tool to the arsenal
6%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
usually can only be used by the root user. After starting the container, call http://localhost:4000 in your browser for a link to the API documentation and the Go profiler. To query Blocky's current
6%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
). In fact, that’s the subject of the next article. The Author Jeff Layton has been in the HPC business for almost 25 years (starting when he was 4 years old). He can be found lounging around at a nearby
6%
Environment Modules Using Lmod
08.08.2018
Home »  HPC  »  Articles  » 
, indeed. The Author Jeff Layton has been in the HPC business for almost 25 years (starting when he was 4 years old). He can be found lounging around at a nearby Frys enjoying the coffee and waiting
6%
SSH on Windows
17.09.2013
Home »  Articles  » 
session in a profile. The authentication sequence is identical on Linux and Unix. When you connect to the remote server, it asks for proof that the user has one of the public keys stored in the authorized

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice