Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (540)
  • Article (182)
  • News (124)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 85 Next »

17%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
parameters, and it can provide potential attackers a vector for an attack or monitoring. To increase the security, access was restricted to just 30 parameters – compared with the 3,000 parameters that sysctl
17%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
be manipulated retrospectively, which would make technologies such as blockchain superfluous, at least in part. Around 1,000 voxels per level are bundled into a square field that, with all of its levels
17%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
130,000 university staff and students and operates the Munich Scientific Network with around 110,000 devices. To manage the mass of passwords for servers and services operated at the LRZ
17%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
.0.0.0/0 multiport dports 22 Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain f2b-default (1 references
17%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
to the screen (STDOUT; line 15). Listing 1: SSH Script 01 #!/usr/bin/php 02 22); 05 ssh2_auth_password($ssh, 'khess', 'password'); 06 $stream = ssh2_exec
17%
Whitepaper: AMD “Bulldozer” Architecture
10.11.2011
Home »  HPC  »  Vendors  »  AMD  » 
 
6200 Series processors. SVR-16    2Based on testing in AMD Performance Labs as of August, 2011, an AMD Opteron™ processor model 6174 (12-core 2.2GHz) consumes 11.7W in the active idle C1E power state
17%
Listing 5
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
-cli               x86_64     5.3.3-14.el6_3     sl-security                     2.2 M  php-common            x86_64     5.3.3-14.el6_3     sl-security                     522 k  php-gd                x86_64     5
17%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
17 %description 18 Custom SELinux policy module. 19 20 %prep 21 if [ ! -d custom-selinux-policy ]; then 22 mkdir custom-selinux-policy 23 fi 24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
17%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
dockerrepo.matrix.dev/gentoo-glibc:latest-amd64 && touch pushtime Sending build context to Docker daemon 21.12MB Step 1/2 : FROM dockerrepo.matrix.dev/gentoo-base:latest ---> 22fe37b24ebe Step 2/2 : ADD
17%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
Furthermore, new SSH connections (ct state new) to port 22 will be allowed (tcp dport 22). Packets that belong to existing SSH connections are also allowed (ct state established,related) and are detected

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice