Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (346)
  • Article (121)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 47 Next »

12%
Linux infrastructure servers for small and midsize businesses
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © stillfix, 123RF.com
Server, Zentyal, and Univention Corporate Server (UCS). ClearOS: In the Slow Lane The ClearOS [1] Linux derivative is provided by the ClearFoundation nonprofit organization from New Zealand, formerly known
12%
Do You Know Juno?
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © alexskopje, 123RF.com
supported by several leading cloud providers. The OpenStack project [1] relies on a strict cycle. New releases appear in April and October no matter what the cost. To date, the release manager, Thierry Carrez
12%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
to updating one hostname. The first thing you need to do is create a free account by visiting the No-IP website [1] and signing up. Once your account is created, you need to create a hostname; in this example
12%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
created expressly for this purpose. Among other things, this editor checks the syntax of the configuration file. Contrary to what the vi in the name implies, the underlying editor in some distributions
12%
The state of OpenStack in 2022
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by vadim kaipov on Unsplash
money. This task is done on a corporate and individual membership basis, and the money is used to fund the (fairly expensive) OpenStack Summits (Figure 1), among other things
12%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
: % mcp -r /home/laytonjb/data1 /data/laytonjb/project1/data1 This example does a recursive copy from one directory to another. The number of cores is determined by an environment variable, sometimes named
12%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
with the afick.pl -c -i command. On Linux you have to introduce the command with sudo for root privileges (Figure 1). To run it under Windows, open a command prompt with administrator rights, switch
12%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
the DIT and must therefore be unique. An overview of the different abbreviations and their meanings can be found in Table 1. Table 1 LDAP Keywords Abbreviation Full Name
12%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
the ones that you need for your own environment, and installing them in good time. As if that weren't enough trouble, more or less the same thing applies to compliance. Most glaring security issues
12%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
and connect the developer board to the USB-C cable of a computer, wait three seconds, then release the button. Run the flash.bat batch file to pop up the Marauder Flasher script and select option 1. Flash ... The Flipper Zero mobile hacking tool, a highly portable device that looks like a kiddy toy at first glance, can check a wide range of wireless connections for vulnerabilities. We take a look ... Mobile hacking tool

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice