Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 04090 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (621)
  • Article (177)
  • News (50)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 86 Next »

17%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
/UDP 20.22.24.26:5060; 03 Via: SIP/2.0/UDP 192.168.1.10:5060; 04 received=18.17.16.15:25588;branch=z9hG4bKnashds8 05 Record-Route: 22.24.26;lr> 06 Max-Forwards: 70 07 To: Bob 0
17%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
for this entry ignoreip = 127.0.0.1/8 and add any IP addresses after the localhost entry that should never be banned. Separate entries by a single space. I suggest that you enter a limited number of single IP
17%
Whitepaper: AMD “Bulldozer” Architecture
10.11.2011
Home »  HPC  »  Vendors  »  AMD  » 
 
6200 Series processors. SVR-16    2Based on testing in AMD Performance Labs as of August, 2011, an AMD Opteron™ processor model 6174 (12-core 2.2GHz) consumes 11.7W in the active idle C1E power state
17%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
2.2.x. 2.6.30 through 2.6.35 Debian 6 (Squeeze) 2.3.x. 2.6.36 through 3.0 Ubuntu 11.10 2.4.x. 3.1. openSUSE 12.1 2.5.x. 3
17%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
on those attack surfaces that a professional attacker would tend to exploit. IBM refers to a Forrester survey, according to which users of the IBM Randori tool require 90 percent less time for vulnerability
17%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
 loop /snap/core22/864 loop15   7:15   0  12.3M  1 loop /snap/snap-store/959 loop16   7:16   0  73.9M  1 loop /snap/core22/817 loop17   7:17   0 349.7M  1 loop /snap/gnome-3-38-2004/140 loop18   7:18   0
17%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
17 %description 18 Custom SELinux policy module. 19 20 %prep 21 if [ ! -d custom-selinux-policy ]; then 22 mkdir custom-selinux-policy 23 fi 24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
17%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
gas prices. The company announced its VMware Ready Desktop Solutions program on June 22. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
17%
Open source mail archiving software compared
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexander Dedrin, 123RF.com
of these archiving tools. Table 1 Overview of the Test Candidates Features Benno MailArchiv MailArchiva Piler Test version 2.1.0 4 1.1.0 Variant
17%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
a filter chain, assign it to the previously created firewall table, and specify where in the network stack it should be placed: nft create chain inet firewall incoming { type filter hook input priority 0

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 86 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice