Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (40)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 Next »

16%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
an organization by clicking Users | Add Organization (Figure 6). Choose a relevant organization name, enter the details, and click Add . Figure 6: Adding
16%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
to invoke the macro to bind the value of a slider (which can take integer values from 1 to 10) to the variable x. In the figure it's set at the value 6 with the slider. The third cell shows the use
16%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
DiskSizeGB: 47 10 } 11 source: { 12 type: 'PlatformImage' 13 offer: 'windows-ent-cpc' 14 publisher: 'MicrosoftWindowsDesktop' 15 sku: 'win11-22h2-ent-cpc-m365' 16 version
16%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
No a8f5898e-1dc8-49a9-9878-85004b8a61e6 Blocks Win32 API calls from Office macros No 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b Deploys advanced protection against ransomware
16%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
Open Source AI Definition Now Available Version 1.0 of the Open Source AI Definition (OSAID – https://opensource.org/ai) is now available. The definition, which was developed through a year
16%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD
16%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
] and extract WiFi passwords with hashcat [12]. Given the small size of the housing – Flipper Zero is just 10 cm wide and 4 cm high – it is not surprising that the performance of the integrated antennas
16%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
for use on its own social platform. In fact, Meta is behind a number of products that can be found in other projects. RocksDB [6] is an excellent example. The company almost modestly describes Rocks
16%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
. The Agile Solution More than 10 years ago, lack of capacity, no overview, insufficient planning certainty, and general dissatisfaction lead software developers to depart from the established waterfall model
16%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
consuming and expensive, which is what prompted Linbit to build an alternative to Pacemaker that specializes in handling simple use cases: DRBD Reactor [6]. In this article, I describe how DRBD and DRBD

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice