Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (306)
  • News (26)
  • Article (9)
Keywords

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 Next »

37%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
Version 4 (TCP/IPv4) provide various settings, such as integrating Windows into a Windows domain. The settings are prone to incorrect configurations, so you should check them after setup or if you
37%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
to leave the maintenance of the application ecosystem to third-party providers of the respective tools. However, in the security context, container-based workloads come with challenges that do not exist
37%
SC25 Highlights
20.01.2026
Home »  Articles  » 
 
for data centers. Some companies are developing and are now offering jet engines to provide power. Aircraft manufacturer Boom Supersonic is developing natural gas turbines for power generation. These engines
37%
Container compliance with dockle
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
functionality. Listing 5 shows the example provided for a GitHub action failing on a WARN check level. (The dockle software comes with a variety of warnings (Table 1) that should help you grade the level
37%
Open source remote access to Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Nikolay Okhitin, Fotolia
Access FreeNX [2] is a great remote access program. It uses the NX protocol, which was released by NoMachine [3] as open source. According to the FreeNX website, the product "provides near local speed
37%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
staff in a very simple way can sometimes provide a solution. Terminal programs exist for any operating system, and they can support access via dialup connections, encrypted Internet connections, internal
37%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
need to support error correction for ECC; if they do not, ECC modules will run without providing ECC support. Error-correcting modules are visibly identifiable if you check the number of soldered memory
37%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
change the /lxc/conf.guest configuration file, you need to delete the existing configuration by typing lxc-destroy -n guestname and then create a new one with lxc-create. The LXC how-to [1] provides
37%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
this: import logging The module provides static functions like debug, info, and warning that let you output information at different logging levels. The principle is perhaps best known from Unix
37%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
a payload that will not match the available antivirus signatures. The Metasploit [1] penetration testing framework provides a collection of tools you can use to test a network by attacking it the way

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice