Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (498)
  • Article (140)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 66 Next »

11%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
) NOT NULL, 06 master VARCHAR(128) DEFAULT NULL, 07 last_check INT DEFAULT NULL, 08 type VARCHAR(6) NOT NULL, 09 notified_serial INT UNSIGNED DEFAULT
11%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
packages, whereas a Debian developer (DD) as a Debian member can upload any package. Fedora As soon as work starts on a new version of Fedora, the developers create a new GnuPG key [6] and use it to sign
11%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
_ALL=C /usr/bin/mrtg /etc/mrtg/mrtg.cfg --lock-file /var/lock/mrtg/mrtg_l --confcache-file /var/lib/mrtg/mrtg.ok) Aug 22 17:12:50 test1 laytonjb: This is a cron test Logger allows you to direct your comments
11%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, 28 ports open for incoming connections, and 441 packages installed and not updated for a while. Listing 2: grep, ps and netstat example results user@metasploitable:~$ uname -a Linux metasploitable 2.6
11%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
11%
The new OpenStack version 2014.1 alias "Icehouse"
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Jakub Krechowicz, 123RF.com
to be heartily unimpressed by the hustle and bustle of Neutron, because more functionality inevitably comes at the price of more complexity. In Icehouse, the order of the day seems to be IPv6. To date, IPv6
11%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which
11%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
://dev.mysql.com/doc/relnotes/mysql/9.0/en/. NordVPN Launches File Checker Tool NordVPN has launched File Checker (https://www.globenewswire.com/Tracker?data=el9wEU_rBQa0VA4YBDAzMUm-twUCIKS38iW1CpZ6mv6Q1bUSqGzedAdTWU-x1-tZIWRzZXNED4Hq
11%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Infrastructure as a Service (IaaS) [4], Red Hat Cloud with Virtualization Bundle [5], and Open Architecture IaaS service [6], are designed to support companies who want to build their own private, public
11%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
style as Redundancy Groups: RAID-1, RAID-Z1 (like RAID-5), RAID-Z2 (like RAID-6), and RAID-Z3 (with triple parity). Netgear uses these modes, too, but calls them RAID-5 and RAID-6, following the classic

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice