Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3%390 Llorente"500 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (52)
  • Article (10)
  • News (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 Next »

44%
Sharing threat information with MISP
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Ricardo Resende on Unsplash
on http://127.0.0.1:5000 . You will see the overview of your local MISP server and can proceed to complete the configuration. If you click on Server Settings & Maintenance below Administration , you
44%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
version of the 5.10 kernel should be officially available in December 2020. Some of the more important features to be found in the 5.10 kernel include support for AMD Zen 3 CPU, the new Ryzen 5000 line ... In the news: Red Hat Enterprise Linux 8.3 Available, It's Official – Linux 5.10 is the Next LTS Kernel, System76 Unleashes World's Smallest Quad-GPU Workstation, Canonical Releases Autonomous
44%
Goodbye Google Cloud Print
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © bilderbox, fotolia.com
printers. What may not be a problem with a 10-person start-up generates an unreasonable amount of work with 5,000 employees. Security through printer vendor- and location-independent release printing (i
44%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
Germany, according to some security researchers, with up to 5,000 new infections per hour. The Netherlands and the United States follow in the ranking at some distance. Locky is mainly spread by email
44%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
-list +--------------------------------------+-----------+------------------ | id | name | subnets | +--------------------------------------+-----------+------------------ | 42a99eb6-3de7-4ffb-b34e-6ce622dbdefc | admin-net|928598b5 ... OpenStack workshop, part 3:Gimmicks, extensions, and high availability
44%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
of continuous integration [2] or continuous delivery [3], allowing developers to extend their projects quickly, add new features, and deliver the goods. Because they handle classical administrative tasks
44%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
licensed. NexentaStor [3] distinguishes between the Community Edition and the Enterprise Edition. The Community Edition is free, but not intended for production systems (which the EULA explicitly forbids
44%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
below threshold 130 iter = iter + 1 ! increment iteration counter 131 IF (iter > 5000) THEN 132 WRITE(*,*)'Iteration terminated (exceeds 5000)' 133 STOP
44%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
], LANDESK [3], Google's G Suite Mobile Management [4], and bitFit [5]. Herd Immunity One of the most impressive aspects of Netflix's Stethoscope is that, when it displays its findings, it generously
44%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
yourself a headache and don't use them. HTTP requests usually use port 80 or 8080. Port numbers roughly in the range 1025 to 5000 usually produce adequate results. Just be sure to use the same port on both

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice