Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (75)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

8%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
-certs, make, gcc, and g++. The certificates from ssl-cert will be required later. According to the how-to http://1, Chef prefers RubyGems version 1.3.6 or newer, but not 1.3.7. This version contains a bug
8%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.0 is released. After evaluating several systems, Mlmmj
8%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
. Firewalls for the Web In contrast to legacy packet filters, Web Application Firewalls (WAFs) don't inspect data in the network or transport layer, but rather at the HTTP protocol level (i.e., in OSI Layer 7
8%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
time is measured from the point at which it is called by the core up to the time it returns the return code. In the worst possible case, executing a plugin will cause a timeout because the component you ... 7
8%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
] and Azure Monitor [3] services monitor the IoT data stream via the alert path. Azure Monitor also offers additional features for analysis, visualization, and automatic actions, which I will not be discussing
8%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
 
customers to block any IP address that is behaving in an abusive way. Akamai Kona Site Defender will be generally available April 11, 2012. For more information, visit http://www.akamai.com
8%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
and manage flows between environments by DevOps pipelines without granting users direct access to the production environment; flows that process large volumes of data or start frequently, generating many
8%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv3
8%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
with Ethernet addresses), the seventh bit is inverted. In my example, the last 64 bits of the address would create the host part of a block of 64 normally used for a LAN: 02:11:22:FF:FE:33:44:55. The client
8%
Controlling multiple systems simultaneously with Synergy
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
©Kheng Ho Toh, 123RF.com
To operate Synergy, you need at least two PCs, each with its own operating system, monitor, and functional network card. The software supports Windows 95 through Windows 7, Mac OS X as of version 10

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice