Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 249 250 251 252 253 254 255 256 257 258 259 260 261 Next »

36%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
a matching agent for the task on the MCollective community page, you can, of course, develop a new agent with matching clients. Some basic knowledge of Ruby is necessary for this part the SimpleRPC framework
36%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
it to the list of available sessions under Default Settings . You can't delete the Default Settings entry (Figure 3). Figure 3: Setting up a New Unix SSH Session
36%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
. Fuzzer – Fuzzer scripts are used for discovering new vulnerabilities or identification techniques and generally work by sending random data to a service. Intrusive – Intrusive scripts can either crash
36%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
services on the Internet and make it their new standard. If an email address and password combination is stolen from a web store or database, it will end up in the password lists of attackers. Users who fail
36%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
setup [7] – that take just a few minutes to complete. The Enterprise Linux (EL) setup uses a tarball image, which makes upgrading the server to new versions slightly more complex. The setup on Debian ... Chat servers likely send confidential data to the cloud, so if you don't want to see your business talks on Google or Amazon, you can keep your information safely in your own data center with self
36%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
Maps (Listing 4). At this point, you can now create a new ActionSet to reference the ConfigMap just generated and pass it to the Blueprint just defined (Listing 5). Listing 4 Extending the Blueprint
36%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
arcane hardware issues and shell-scripting mysteries, and takes his McFlurry shaken, not stirred. You can read more from him in the new O'Reilly title AWS System Administration .
36%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
environments. Many administrators enter a new static host entry on their DNS server that points to the IP address of the server in the other namespace. However, this procedure is incorrect, even though it sort
36%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
and their connectivity differs from classic IT infrastructure monitoring for several reasons and presents new challenges for ops teams. First and foremost is the equipment of the IoT devices and what is often a narrowband
36%
Sharing Data with SSHFS
23.04.2014
Home »  HPC  »  Articles  » 
_storage_Discussion.doc     4 OLD/           4 STRACE_NEW_PY/    4 FS_AGING/                       4 OTHER2/        4 STRACENG/    4 FS_Scan/                        4 PAK/           4 STRACE_PY/  324 fs

« Previous 1 ... 249 250 251 252 253 254 255 256 257 258 259 260 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice