Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (85)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

85%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
. Attack vectors are many; for example, the libraries and tools in containers are not normally covered by the host's software manager, which means that, in container-based environments, you cannot just rely
85%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
all the monitoring applications involved, sorting the messages by criticality. If you don't want to commit right away, the demo page [2] will give you a taste of the features. Installing Alerta Alerta
85%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
editor, grep, and a cross-referencer (either cscope [2] or LXR [3]). Although automated source code vulnerability scanners have their place, especially in auditing very large code bases, I haven't found ... 3
85%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
is accomplished by the WebSockets.send() call. The for loop keeps the connection open until the user closes it, which normally happens on closing the web page. Listing  3 shows the typical pattern for using
85%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
and normally resides in /sbin. In each case, Upstart first sends a SIGTERM signal to the job in question and then waits for the default five seconds. If the job is still running after this wait, Upstart
84%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
a product or to integrate Horde into their own solutions. User Settings Horde isn't just flexible in terms of the server-side configuration but also offers users a number of settings. Compared with Horde 3
84%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
, such as ipv6.google.com. If one of these pings doesn't work, check the server setup, including the default gateway and firewall configuration. Figure 2: ip -6
84%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.com [3] for a video that might help you set up your environment
84%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
than 0 (Figure 3). If not, either the processor doesn't support the special commands, or the commands have been disabled in the computer's BIOS. Users with Intel processors can additionally check
84%
openlava – Hot resource manager
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Konrad Bak, 123RF.com
to pay attention to a few gotchas. (In my first attempt, I didn't pay attention to these.) In the next sections, I'll walk through the installation of openlava on a cluster (the Warewulf-based cluster [3

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice