Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (307)
  • Article (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35

59%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
experience, the DebOps developers have learned that they need to check the condition of the target systems. The DebOps documentation recommends you enter the command debops-task all -m setup after you set up
59%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
, a request like http://www.example.com/index.html?file=/etc/passwd would trigger the sample rule in line 8. Then the action defined in line 9 would block the request. The client sees an HTTP 403 Forbidden
59%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
, which makes for a ridiculously large address space, although back when IPv4 was created, I'm sure they thought the same thing (see the "IPv6 Logging" box). IPv6 Logging For any logging of network
59%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
Flux Figure 3: … as M.2 memory modules for the corresponding slots. The type and scope of the installed components are identical across the different form factors. © ScaleFlux The manufacturer
59%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
OTP (mOTP) in their smartphones for the same effect. Although it might be argued that a smartphone is less secure than the Nitrokey, because a smartphone can suffer malware attacks more easily than
59%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
books [5] online can help you get started. High-Level Libraries The last approach to parallel I/O I'm going to mention is high-level libraries that you can use for storing data (read and write
59%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
/spool/mlmmj/global.libreoffice.org/users -m outputs the addresses of the moderators. To manually subscribe and unsubscribe recipients, you can use mlmmj-sub and mlmmj-unsub, respectively. For example, this command sudo -u mlmmj /usr
57%
Generating information with the touch of a button
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
apparently been saved with a Windows editor, and Linux shells can have problems with the superfluous Ctrl-M's at the end of each line. This apparently was the case with all of the shell scripts because each
56%
New features in the Bareos Bacula fork
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Maxim Kazmin, 123RF.com
Status Director *status director ... Terminated Jobs: JobId Level Files Bytes Status Finished Name ===================================================== 1 Full 135 6.679 M OK 18-Jul-13 16:00 Backup

« Previous 1 ... 28 29 30 31 32 33 34 35

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice