Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (48)
Keywords

« Previous 1 2 3 4 5

22%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
with its e-tokens – one reason they were acquired by SafeNet. However, e-token is e-token, whether labeled Aladdin or SafeNet. At a price of around US$ 100, an e-token is basically a USB device containing
22%
Updating Small Business Server 2008
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Petra Wanzki, Fotolia
Connections action is enabled. To enable the rule on the clients, enter gpupdate /force or reboot. Forefront for Exchange 10.0 with SP2 Rollup 2 During the SBS 2008 installation, you can opt to install a 120
22%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
consuming and expensive, which is what prompted Linbit to build an alternative to Pacemaker that specializes in handling simple use cases: DRBD Reactor [6]. In this article, I describe how DRBD and DRBD
22%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
Podman in their standard repositories. In immutable Linux distributions like Fedora CoreOS [5] and openSUSE MicroOS [6] (Figure 1), Podman comes pre-installed. Both Linux distributions offer a minimal
22%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
In the coming years, the cloud computing market is easily expected to exceed US$ 100 billion. Many organizations have found using the cloud has a clear advantage over in-house hardware. Indeed
22%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
, 09 'protocol' => 'imap', 10 'port' => 143, 11 // Plaintext logins are disabled by default on 12 // IMAP servers (see RFC 3501 [6.2.3]) 13 'secure' => 'tls', 14 'maildomain
22%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
, and to provide protection against VoIP spam by various means. Additionally, other initiatives are SpITAssassin [6], an extension of SpamAssassin functionality, and the SPIT defense solution (SPIT AL). SPIT AL
21%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10

« Previous 1 2 3 4 5

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice