Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1167)
  • Article (116)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 140 Next »

37%
Manage resources with AWS CloudFormation
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © krisckam, 123RF.com
-9]*", "ConstraintDescription" : "must contain only alphanumeric characters." }, "DBAllocatedStorage" : { "Default": "5", "Description" : "The size of the database (Gb)", "Type": "Number", "Min
37%
Benchmarking a new architecture
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
wired Ethernet and WiFi. The eMMC can be flashed to a different distribution over USB, and serial debugging interfaces are accessible. Power is supplied over a 2.1mm barrel connector at 5V, or directly
37%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
. Finally, mandatory internal and external requirements, such as the Sarbanes-Oxley Act (SOX) [5], PCI-DSS [6], ISO 27001 [7], and Basel II [8], ensure technical and organizational compliance. Ultimately
37%
Veeam Agent for Linux backup software
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
/backup/ (Figure 5), which leaves you free to choose your preferred tool for restoring files and directories. For example the Midnight Commander tool on the console is a possibility (Figure 6), or you could use
37%
Configuration management and automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Valerijs Kostreckis, 123RF.com
package before installing: $ wget http://dl.bintray.com/rundeck/rundeck-deb/rundeck-2.6.7-1-GA.deb $ sudo dpkg -i rundeck-2.6.7-1-GA.deb Installing a package is practical because it integrates a Rundeck
37%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
here, click on List zones (Figure 7) and then Edit an existing example.com zone, as in Figure 8. Figure 5: Poweradmin management web GUI
37%
Version 5.2 of the Ruby framework
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Author, 123RF.com
Ruby on Rails (RoR) version 5.1 [1] introduced Secrets, a mechanism designed to ensure that a programming team can store encrypted passwords or API keys in a public repository. However ... Ruby on Rails 5.2 was released during RailsConf, which took place in Pittsburgh in mid-April 2018. Although not much has changed for old Rails applications, you'll find a few notable additions ... Version 5.2 of the Ruby framework
37%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
chips," said Armis in a blog post. https://armis.com/bleedingbit/ According to Armis, these BLE chips are used widely in devices manufactured by players that include Cisco, Meraki, and Aruba
37%
News for Admins
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
 
of an undetected, full server breach." Find out more from Nextcloud's official release statement (https://nextcloud.com/blog/production-ready-end-to-end-encryption ... In the news: Nextcloud Hub now supports end-to-end encryption, Three major threats to Linux discovered, Linux Kernel 5.8 is now available, BootHole patched for CentOS
37%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
broken and should no longer be used. However, you need to make a distinction between theoretical and practical attacks on the algorithm. Nowadays it is possible to break Message-Digest Algorithm 5 (MD5) [1

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 140 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice