Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 201 Next »

18%
News for Admins
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
 
." More Than 80% of Android Devices at Risk of Attack More than 80% of Android devices, or approximately 1.4 billion mobile devices, are vulnerable to a Linux exploit that allows bad actors to spy on users
18%
Writing SELinux modules
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Amy Walters, 123RF.com
A type enforcement (.te) file stores the actual ruleset. To a large extent, it consists of m4 macros, or interfaces. For example, if you want to access a particular service's resources
18%
CloudStack Up Close
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
served as release manager for the CloudStack 4.0.0 and 4.1.0 releases. He is a principal engineer in the Cloud Engineering organization at SunGard Availability Services, where he is responsible
18%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
a physical network and extend the maximum number of supported 802.1Q VLANs from 4,094 to up to 16 million. Generic Network Virtualization Encapsulation (GENEVE) is a newer tunneling protocol developed
18%
Dispatches from the world of IT
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
 
, including LibreOffice 4.0.3, GIMP 2.8, and Iceweasel 21.0. Virtualbox 4.2.10 and KVM Qemu 1.5.0 provide virtualization, with Wine 1.5 to run Windows applications on Linux. Anonymized web browsing includes
18%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
, you might not have enough IPv4 addresses in place; on the other hand, a database usually doesn't need a public IP. In contrast, web servers (or at least their upstream load balancers) really should
18%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
servers. 4. You do not need to repeat this action on each DNS server in the subdomain if you replicate the records on the DNS server for the subdomain. For this to work, the subdomain first needs
18%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
to the network is still possible via the HTTP port 80, but all other access is prohibited: $ ping 8.8.4.4 ping: icmp open socket: Permission denied $ nc -v aspmx.l.google.com 25 nc: connect to aspmx
18%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
this writes an LVM label and some metadata to the PV. The PV is divided up into units of the same size (4MB by default) known as physical extents (PEs). A PE is the smallest allocatable data volume. Figure 1
18%
Rethinking RAID (on Linux)
16.03.2021
Home »  HPC  »  Articles  » 
operations (Listing 2). The results show that the single HDD has a throughput of 1.4MBps for random writes and 1.9MBps for random reads. Listing 1: Random Write Test $ sudo fio --bs=4k --ioengine

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice