Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (104)
  • Article (9)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

15%
ratarmount Archive Mount Tool
07.09.2025
Home »  Articles  » 
accessing various files in the archive. It has the same name as the archive but adds .index.sqlite  to the end. When you remount the archive, this file will be read rather than going through the archive
15%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
a DHCP server, a VPN or Remote Desktop gateway, or a 802.1X-capable switch (Figure 2). The enforcement point forwards the identified integrity status to the Network Policy Server (NPS), which then uses ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they ... NAP with 802.1X ... Port-based access protection with NAP and 802.1X
15%
Fedora 16 dials up cloud and virtualization capabilities.
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
desktop. The Gnome version that comes with Fedora 16 is definitely a more convincing package than Unity; however, from an administrator's point of view, the pillars of Gnome 3.2.1, including desktop
15%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
)_$ARCH $ curl -sLO "https://github.com/eksctl-io/eksctl/releases/latest/download/eksctl_$PLATFORM.tar.gz" $ curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" $ tar -xzf "eksctl
15%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
and developed ideas with Keras. Keras and VGG16 Getting started with Keras is not difficult. Rather than use the MNIST [2] dataset of 60,000 grayscale images as an example, I'll use a VGG16 [3] model
15%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
it has been covered before [2]. Zentyal Servers Zentyal is an Ubuntu-based Small Business Server distributed in the past under the name "eBox." The product is developed by the Spanish open source company
15%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
(header :matches "From" "\"Florian Effenberger\"", 03 header :matches "X-Mailer" "EPOC Email Version 2.10") { 04 setflag "\\Seen"; 05 fileinto "Sent"; 06 stop
15%
Maatkit tools for database administrators
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
tiero, 123RF
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of 22 seconds to answer ... 2
15%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
the matching cookie has been deleted in the browser, as long as the server does not flag the associated session record as expired. This lifetime is usually defined by a timeout value set by the server logic
15%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
and on their virtual machines is currently working at its limits. More than just banks have to adhere to mandatory transaction times for their customers, which is why the speeds and response times determined by E2E

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice