Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (315)
  • Article (99)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 46 Next »

27%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
B       hald-addon-input   ...    22.9 MiB +   4.0 MiB =  26.9 MiB       plasma-desktop  26.0 MiB +   5.7 MiB =  31.7 MiB       konsole (3)  28.3 MiB +   4.4 MiB =  32.7 MiB       kwin  41.0 MiB +   2.0 MiB =  43.0 MiB       Xorg 146
27%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
27%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
.get('mail') 22 if not useremail: 23 print "User " + username + " has no Email address in LDAP" 24 # Import smtplib for the actual sending function 25
27%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
21 # The name and age of the persons who know the person with ID 1: 22 gremlin> g.V(1).outE('knows').inV().valueMap('name', 'age') 23 ==>[name:[vadas],age:[27]] 24 ==>[name:[josh],age:[32]] 25 26
27%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
of the Windows Backup and the installation DVD. Bare Metal Restore on New Hardware Windows Server 2008 R2 and Windows Server 2012/2012 R2 let you restore a system backup on different hardware. In the wizard ... 22
27%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
Map 18 metadata: 19 name: mariadb 20 labels: 21 app: mariadb 22 data: 23 MYSQL_ROOT_PASSWORD: mysqlroot 24 MYSQL_DATABASE: db1 25 MYSQL_USER: mysqluser 26 MYSQL_PASSWORD: mysqlpwd
27%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
others. Use SELinux, if possible; otherwise, use AppArmor [16], grsecurity [17], or PaX [18] to lock down unexpected system resource access. Patch your systems more often than usual; even official
27%
XP Apocalypse
20.08.2013
Home »  News  » 
 
vulnerability might apply to several Microsoft systems, which is why security patches are often released for all systems simultaneously. Rains points out, "Between July 2012 and July 2013, Windows XP
27%
Google Compute Engine Open for Business
10.12.2013
Home »  News  » 
 
Google has announced that the Google Compute Engine cloud service is now open to the general public. The Google Computer Engine, which was first unveiled at the Google I/O conference in 2012
27%
Lenovo Buys Motorola Phone Division
03.02.2014
Home »  News  » 
 
The Chinese manufacturer Lenovo is on a shopping spree. A week after acquiring the IBM x86 server division, Chinese PC giant has also purchased the mobile phone manufacturer Motorola Mobility from

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice