Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (266)
  • Article (80)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 38 Next »

6%
Tuning ZFS for Speed on Linux
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Wong Yu Liang, 123RF.com
into cache, is very high because of the nature of randomized read I/O profiles and operations. The amount of memory the ARC can use on your local system can be managed in multiple ways. For instance, if you
6%
Monitor your network
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Endrille, Fotolia
is a multi-tenant service that can be accessed by multiple users with different profiles. Roll Out the Server While you can deploy Pandora FMS on all kinds of operating systems, including Windows, Linux
6%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
_path": "/var/log/osquery", 07 "disable_logging": "false", 08 "schedule_splay_percent": 10 09 }, 10 "schedule": { 11 "osquery_profile": { 12 "query": "SELECT * FROM osquery_info;", 13
6%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
multiple people to go to the compromised website. In this article, I profile a persistent XSS attack. Reflected: Malicious input originates from the victim's request, which means the victim has either
6%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
is encrypted with the EFS certificate stored in a user's profile. If EFS does not find an enterprise CA in AD, the EFS process creates a self-signed certificate with a longer lifespan. This certificate is now
6%
Ease your network inventory pain with Spiceworks
07.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Paul Tobeck, fotolia.com
and to participate in the Spiceworks community, including user forums, administrators must sign up for an account. Optionally, administrators may choose to complete a profile and take part in the extensive community
6%
OpenNebula – Open source data center virtualization
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Sternenhimmel, fotolia.com
and simultaneous central control of the environment. This separation may take the application profile into consideration but also the location or customer. Even if you group together a large number of Open
6%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
on Vulnerability Exploitability eXchange (VEX), which was developed by the NTIA. VEX is implemented as a profile in the Common Security Advisory Framework (CASF) of OASIS Open and is supported by CycloneDX [5
6%
Easy configuration management with Puppet
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Warangkana Bunyarittongchai, 123RF
your my.cnf file. Setting up /etc/logrotate.d/our-logs with Puppet means you don't have to remember it. Creating /etc/profile.d/binpath.sh will mean that a customization no one can quite remember
6%
What's new in Microsoft Windows 8.1
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Doroto C-, 123RF.com
, these are not the libraries of Windows 7 but only the folders from the logged-on user's profile. Figure 5: Microsoft has redesigned the Explorer view in Windows 8

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice