Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 230 231 232 233 234 235 236 237 238 239 240 241 242 243 ... 261 Next »

36%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
back ends), such as Google storage, Amazon S3, Amazon Reduced Redundancy Storage (RRS), OpenStack Swift, Rackspace Cloud Files, S3-compatible targets, local filesystems, and even filesystems accessed
36%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
to enable packet forwarding: net.ipv4.ip_forward=1 Then, reboot to ensure that the new configuration is active. iptables and Masquerading Finally, you need to look at the firewall configuration
36%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
using a fixed key or X.509 certificates (new extensions with other approaches now also exist). In this phase, a hash and an encryption algorithm are chosen from a configured selection. Optionally
36%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
that it is available on all clients. The IM server can also access other systems on the Internet. For example, IceWarp supports ICQ, Google Talk, Yahoo, or Facebook chat. Administrators can define which networks
36%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
administration actually takes place on the RADIUS server. If you take on a new employee, you enter their account on the RADIUS server, WiFi access included. Figure
36%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
, a variable uses keys, which can be of different types, to store a variety of values. In a table, neither the keys nor the values need to be of the same type. A new table is initialized in Lua with the curly
36%
Network Grep
26.11.2012
Home »  Articles  » 
 
and wraps text when a new line is spotted, making those raw HTTP packets significantly easier to read with the human eye. It differentiates the packet headers and their associated payload nicely, too
36%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
a 32GB USB (or larger) drive or you purchase one new for this project matters little because you have to wipe it clean before use, so be sure Windows To Go is what you want on this drive before you start
36%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
's Tick-Tock processor model you can see that the "tick" is a die-shrink and the "tock" is a new processor design. During the tick, more cores are usually added, which gives more processing power but also
36%
John the Ripper
22.08.2011
Home »  Articles  » 
 
computer and enough time, no password can escape the hacker’s relentless attack. Time is important when cracking passwords because the hacker knows that once the victim discovers the compromise, new security

« Previous 1 ... 230 231 232 233 234 235 236 237 238 239 240 241 242 243 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice