Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (318)
  • Article (70)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39

49%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
Flux Figure 3: … as M.2 memory modules for the corresponding slots. The type and scope of the installed components are identical across the different form factors. © ScaleFlux The manufacturer
49%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
-server-ctl user-create jstanger James Stanger jstanger@company.com Cr8*p@sswrd*here -f /tmp/jstanger.key Now that you’ve created a certificate and a user, make sure that the PEM files are in the right place ... 0 ... 0
49%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.0 is released. After evaluating several systems, Mlmmj
49%
Generating information with the touch of a button
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
) package, which includes various tools and packages intended to implement "full Enterprise Resource Planning" (ERP). GNUe Reports depends on the GNUe Common package, and version 0.6.9 was available through
49%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
open these attachments and malicious code is executed, companies rely on their virus scanners and combine them with behavior-based detection – especially in a cloud with an endpoint (E), managed (M
48%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
experience, the DebOps developers have learned that they need to check the condition of the target systems. The DebOps documentation recommends you enter the command debops-task all -m setup after you set up
48%
New features in the Bareos Bacula fork
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Maxim Kazmin, 123RF.com
to Storage daemon File at bareos:9103 ... Sending label command for Volume "file1" Slot 0 ... 3000 OK label. VolBytes=186 Volume="file1" Device="FileStorage" (/var/lib/bareos/storage) Catalog record for Volume
47%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
OTP (mOTP) in their smartphones for the same effect. Although it might be argued that a smartphone is less secure than the Nitrokey, because a smartphone can suffer malware attacks more easily than
47%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
books [5] online can help you get started. High-Level Libraries The last approach to parallel I/O I'm going to mention is high-level libraries that you can use for storing data (read and write

« Previous 1 ... 32 33 34 35 36 37 38 39

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice