Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (156)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 109 Next »

12%
News for Admins
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
 
." According to GitGuardian, NHI Governance ensures that NHIs and their secrets are: Created securely with least-privilege principles Monitored continuously for suspicious access patterns Rotated
12%
More Best Practices for HPC Containers
19.02.2020
Home »  HPC  »  Articles  » 
developing tools, applications, and libraries to share with each other and to run on their laptops. Assuming they were root, access was a given. If you are root, you can do anything. Docker is still important
12%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
, energy, and  – on laptops – battery power, even though this is unnecessary in idle mode. The new kernel fixes this vulnerability by not listening for events at fixed times but only when they occur
12%
Preload Trick
11.05.2021
Home »  HPC  »  Articles  » 
the LD_PRELOAD trick to have Octave call a different BLAS library, resulting in different, conceivably better, performance. The test system is my Linux laptop: CPU: Intel(R) Core(TM) i5-10300H CPU @2
12%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
. User licenses give users access to a server from their devices (e.g., PCs, laptops, tablets, or smartphones). To find the best approach for an enterprise, you always need to do the math. Licenses
12%
Linux I/O Schedulers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © pandavector, 123RF.com
The Linux kernel is a very complex piece of software used on a variety of computers, including embedded devices that need real-time performance, hand-held devices, laptops, desktops, servers
12%
A Substitute for cron
18.03.2013
Home »  Articles  » 
 
on certain conditions. The syntax for this is: when : For example, the Whenjobs changes function lets you monitor when a variable changes. Using the above variables, you can thus
12%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
of traveling around the world talking with IT techs and cybersecurity workers, I've asked them about "killer cyber analytics tools." Invariably, they talk about monitoring logfiles and system processes
12%
Moving Data Between Virtual Machines
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © alphaspirit, 123RF.com
sniffer. Two Approaches to Monitoring The benefit of using a VM as your packet collector on the server is that you don't need any additional hardware. The drawback, however, is that this approach
12%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
monitors security-related activities of user accounts, such as those caused by hackers moving around the corporate network. The activities can include brute force login attempts, unusual changes to group

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 109 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice