Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede 12 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (56)
  • Article (2)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6

18%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03#section-1-2), which notes that "the cryptographic security of key exchanges relies on certain instances of the discrete logarithm problem being
18%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
can use Kustomize or Helm to install the AWX operator with default settings, as described in the documentation [2]. Operator version 2.12.2 was used for this example. The main playbook for the AWX 00
18%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
No a8f5898e-1dc8-49a9-9878-85004b8a61e6 Blocks Win32 API calls from Office macros No 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b Deploys advanced protection against ransomware
18%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
] and extract WiFi passwords with hashcat [12]. Given the small size of the housing – Flipper Zero is just 10 cm wide and 4 cm high – it is not surprising that the performance of the integrated antennas
18%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
[12], and Icinga [13], with the advantage that existing alert chains and escalation levels can be rehashed without any problems. Once Falco is connected to the existing monitoring system, alerts
18%
Remote access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
than 4GB of RAM. If your setup is not too large, you should be able to back up the environment's new data and the metrics data history for around a year on 500GB. Debian GNU/Linux 12 is strongly
18%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
for exchanging experiences as well. And, if you want to stay on top of developments concerning Kanban while traveling, the "ITK Podcast" [12] is recommended. Infos Scrum: http
18%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
of Ubuntu 10.04 LTS, whereas v3.0 [5] makes the jump to Ubuntu 12.04 LTS. As an alternative, the beta version 2.3 is available for download. Building Under Ubuntu Targeted at small and medium
18%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
systemctl restart libvirt-bin Linbit itself offers the virter tool, which can create and clone Libvirt VMs over the command-line interface [12]. Quick Start Strictly speaking, DRBD Reactor itself

« Previous 1 2 3 4 5 6

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice