Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (224)
  • Article (97)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 Next »

15%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
. Here are some examples: _{3,} – Three or more consecutive underscores · {2,5} – Between two and five spaces in a row (where · is a space) (the·){2} – Two consecutive
15%
Storage monitoring with Grafana
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Gino Santa Maria, 123RF.com
access, so to change the configuration of devices over SNMP, you have to use the secure but more complex SNMPv3. To enable SNMPv2 on a Linux system, simply install the appropriate package with the SNMP
15%
Integrating FreeIPA with Active Directory
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © payphoto, 123RF.com
, these days, the System Security Services Daemon (SSSD) [2] is used most of the time in such scenarios. This approach, together with the software [3], is the simplest way to integrate Linux clients directly
15%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
6105) [3] and DHCPv6-Shield [4]. These functions are implemented on switches and referred to as First Hop Security. SEND (Secure Neighbor Discovery) [5] is an approach that relies on cryptographically
15%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
access Cloud NAT is a managed service and, as such, offers high availability of at least 99.9 percent. It is also regionally resilient to zone failure. Figure 3 shows the use of Cloud NAT in a global
15%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
Diagnostic settings under the Monitoring section (Figures 2 and 3). Here, you add a new diagnostic setting, name it, choose the logs and metrics you want to collect, and specify the Log Analytics workspace
15%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
for the type of analysis you want to perform. Capture filters use the Libpcap syntax. To filter for a specific MAC address, you would do the following in Libpcap syntax: ether host 00:25:4b:bd:24:94 However
15%
Parallel Julia – Jumping Right In
29.06.2012
Home »  HPC  »  Articles  » 
| | | | | | |/ _` | | | | |_| | | | (_| | | Version 0.0.0+86921303.rc6cb _/ |\__'_|_|_|\__'_| | Commit c6cbcd11c8 (2012-05-25 00:27:29) |__/ | julia> If you don't want to see the title on subsequent start ups use julia -q
15%
Memory Errors
23.03.2016
Home »  HPC  »  Articles  » 
_scrub_rate     0 ue_count 0 csrow0           0 csrow3  0 csrow6  0 mc_name  0 seconds_since_reset  0 ue_noinfo_count In the /sys filesystem, for each csrow, a number of entries contain a lot of information
15%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
and then sequentially browsing log entries. Kafka does not allow queries like ANSI SQL, which lets you search for a certain value. (3) The events in the log prove to be immutable – past events are very difficult to undo

« Previous 1 ... 25 26 27 28 29 30 31 32 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice