Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"22%2000 Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (360)
  • Article (71)
  • News (38)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 47 Next »

21%
Logging with systemd
18.02.2014
Home »  Articles  » 
In most cases, log messages are managed by a Syslog server. The Fedora project wants to take a new approach in future releases. This change is to come from systemd’s journal. ... and no longer meets today’s requirements in a useful way. So, it’s time for a successor, which has actually existed for quite some time in the form of Upstart. Upstart is to a great extent downwardly compatible ... In most cases, log messages are managed by a Syslog server. The Fedora project wants to take a new approach in future releases. This change is to come from systemd’s journal.
21%
Securing the TLS ecosystem with Certificate Transparency
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Bruce Rolff, 123RF.com
, the Certificate Transparency strategy, which was promoted by Google, was already implemented back in 2013. The motivation for Certificate Transparency dates back to 2011. After a break-in at certificate authority
21%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
to deliver support for S/390 as well for eventual full parity with RHEL. The community shouldn't settle for anything less." This is a fully stable release (as the beta was made available back in January
21%
Thrashing the data cache for fun and profit
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Lucy Baldwin, 123RF.com
: $ time ./row real 0m1.388s user 0m0.943s sys 0m0.444s ** $ time ./column real 0m4.538s user 0m4.068s sys 0m0.468s The experiment shows the column-major code taking three and a half
21%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
access is aligned to internal sector size, so that should be your first consideration. Without further data, the rule of thumb adopted by Microsoft in Windows 7 of aligning to 1MB (2048x512 and 256x4096
21%
To syslog or not to syslog
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Zsolt Biczo, 123RF.com
=yesterday --until '2013-11-05 11:00' No idea what systemd-units exist on the system? No problem: The systemctl list-unit-files command displays them. If you are only interested in services, you can restrict
21%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
with the release of Docker in 2013. Docker was the first comprehensive solution for operating application containers. The engine was implemented as a comprehensive API daemon with many tasks. Of course, its primary
21%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
opening the file compromises the computer. The spread of malware or crimeware has not slowed down – on the contrary. Back in the early 1990s, the first tools that greatly facilitated the process
21%
News for Admins
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
 
a distributed denial of service (DDoS) attack on Pokémon Go servers. They announced another planned attack for August 1, which didn't appear to happen. The popularity of the game has raised concerns around
21%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
if the requester is not on the list. The procedure was specified in RFC 6844 back in 2013 [2]. Nevertheless, its use is not particularly widespread, although since support for wildcard certificates was introduced

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice