Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (444)
  • Article (129)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 58 Next »

13%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
] command ... -S return largest of remote command return values -h output usage menu and quit -V output version information and quit -q list
13%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
AMD64 and ARM64 HTTP Boot support in Debian Installer and Live images for UEFI/U-Boot systems Upgraded software stack: Gnome 48, KDE Plasma 6, Linux kernel 6.12 LTS, GCC 14.2, Python 3
13%
LDAP integration with popular groupware suites
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Sergey Tryapitsyn, 123RF.com
Open-Xchange Scalix Tine 2.0 Zarafa Zimbra Product version 14.1 3.4 7.6 12.5 Coriander, 2014.09.10 7.1 8.6 Supported
13%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which
13%
Secure microservices with centralized zero trust
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Christopher Ruel on Unsplash
company, or a multinational conglomerate; the important points are the top-down control of every identity issued, its structure, its time to live (TTL), and, of course, the workload(s) to which it is issued
13%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
with timeout 15 seconds 03 if status != 0 for 3 cycles then exec "/usr/bin/ansible-playbook rebuild_node.yml" 04 if status != 0 for 3 cycles then exec "/usr/bin/mail -s 'Node 5 ping failed
13%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
it in single quotes. Listing 6 ZIP Encryption $ ls -s total 11228 11032 Flying_Beyond_the_Stall.pdf 196 hpc_001.html $ zip --password MY_SECRET file.zip hpc_001.html adding: hpc_001.html
13%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990s by Sun Microsystems, PAM is available on most Unix-style systems
13%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
comparable to Amazon S3 in OpenStack Clouds. Kickstack vs. Packstack Kickstack is not the only tool that enables automatic deployment of OpenStack using Puppet. For example, Red Hat offers
13%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
IDENTIFIED BY 'ohC3teiv'; 10 EOF 11 mysql -u root <12 CREATE DATABASE keystone; 13 GRANT ALL PRIVILEGES ON keystone.* TO 'keystonedbadmin'@'%' 14 IDENTIFIED BY 'Ue0Ud7ra'; 15 EOF 16 mysql -u root <

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice