Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (445)
  • Article (180)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 64 Next »

23%
GUI or Text-Based Interface?
05.12.2018
Home »  HPC  »  Articles  » 
(Wikipedia, CC BY-SA 3.0). Another option is the Newt library, which focuses on color TUIs (Figure 2) and uses a widget approach, making programming a TUI much easier. With Newt, you can create stacked
23%
Linux configuration with OpenLMI
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © haveseen, 123RF.com
Tag: -[UUID:C8040008000011037D001276EE0201AB]- CPU: AMD, x86_64 arch CPU Topology: 4 cpu(s), 8 core(s), 8 thread(s) Memory: 2.0 GB Disk Space: N/A GB total, N/A GB free OS
23%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
servers have long been a worthwhile target for attacks, such as the Li0n worm, which exploited a vulnerability in BIND. Moreover, DNS servers of all kinds are often used as amplifiers in distributed denial
23%
To syslog or not to syslog
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Zsolt Biczo, 123RF.com
, with which you might already be familiar. You can even use the familiar tail options -f and -n to view only the last lines of the journal. Warning messages are bolded by journald, and error messages are output
23%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
to be errors in the development of the server software itself. Internet Information Services (IIS) for Windows Server, Apache or N, mail servers, and many other standard services usually come with a secure basic
23%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
. The Shell Approach The following example assumes you have a host machine running Ubuntu Linux 22.04 with Java installed. Besides Java, you need Nmap network scanner version 7.80 or newer and the Ncrack
23%
High availability for RESTful services with OpenStack
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Ying Feng Johansson, 123RF.com
02 log 127.0.0.1 local0 03 maxconn 4000 04 daemon 05 uid 99 06 gid 99 07 08 defaults 09 log global 10 mode http 11 option httplog 12 option dontlognull 13 timeout server 5s
23%
Exploring PowerDNS
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © ladyann, 123RF.com
/start/restart. Listing 2 Customizing recursor.conf allow-from=192.168.1.0/24 # The 'allow-from' address specifies the network address space you want to service queries to with your PowerDNS recursor. Note you
23%
IT automation with SaltStack
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Harry Cunningham on Unsplash
Rejected Keys: # salt 'minion0*' test.ping With the command salt-key --accept minion0* the master accepts the minion01 and minion02 public keys, which are under its control from this point on
23%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
on the client and PowerShell v4 on the server. Administration via a CSV File In PowerShell remoting, a distinction is made between 1:1 and 1:n (fan-out) relationships. 1:1 remote management is implemented

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 64 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice