Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • Article (122)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 52 Next »

10%
Reading and understanding database execution plans
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Gunnar Pippel, 123RF.com
the explain plan for command in combination with the DBMS_XPLAN.DISPLAY function call (see Example 1). Example 1: Oracle Execution Plan 01 SQL> explain plan for<+>1<+> 02 2> SELECT * 03 3> FROM sales
10%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
-to-router tunnel connects an IPv6/IPv4 node on an IPv4-only network with an IPv6/IPv4 router (Figure 3). To do this, the host uses a tunnel interface and appropriate routing entries (e.g., in the form of the default
10%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
in the form of a master boot record (MBR) or a GUID partition table (GPT) [3]. The tricks the expert used to revive RAID systems (Figure  1) did not help: Neither fdisk nor mmls – the forensic counterpart from
10%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
grants permissions to enable GuardDuty. If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems
10%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
_python_interpreter variables ideally remain unchanged: They cause Python to connect to the host on standard SSH port 22 and to use Python 3 when calling commands on the target system. Next, check whether the devops.hosts setup
10%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
will be based on state-of-art authentication with Active Directory Authentication Library (ADAL) and OAuth 2.0 [3]. Getting Started with Exchange Web Services Since Exchange 2007, Microsoft has recommended
10%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
installation of Kolab 3.0 and later is a matter of one or two cups of coffee and does not impose too many requirements on the admin. The Kolab developers recommend a recent CentOS (preferably 6.4) as the basis ... Open standards and open source are requisite in Kolab groupware. The alpha release of version 3.1 hugely extended the number of compatible clients with the CalDAV and CardDAV protocols, making Kolab
10%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
) for client programs on request. Division of Responsibilities What initially sounds complicated proves to be remarkably simple in practice [3]. First, the developer describes the feature set of their REST API
10%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
to infiltrate other active processes from within Microsoft Office by activating GUID rule 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 . For the most part, you can use this rule safely. Virtually no legitimate enterprise
10%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
) layer for the cloud, virtualizing the various hardware components and making them available through a standard API. The first OpenStack release (dubbed "Austin") became available October 22 [3]; The Open

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice