Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%2222%A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (406)
  • Article (147)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56

27%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
problems with Nessus. Any discussion of security scanning and packet filtering requires some basic knowledge of network ports and Transport Layer protocols [1] [2]. For additional background on these topics
27%
New container solutions for Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Scott Griessel, 123RF.com
, libcontainer . This was not part of the solution right from the start; up until version 0.9, Docker drew directly on LXC to start and manage containers. However, LXC lacked several features, so Docker decided
27%
Tool your HPC systems for data analytics
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Sergey Nivens, 123RF.com
is from TechTarget [2]: "Data Analytics is the science of examining raw data with the purpose of drawing conclusions about that information." It doesn't mention the amount of data, although the implication ... 22
27%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
of the card with a magnetic strip/chip and the associated PIN. Even more secure is a process in which three factors are used – knowledge, possession, biometrics. For example, "QTrust 2go Smart" [1] combines
27%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.9 20 # user setup 21 user --name=example-user --password= --iscrypted --gecos="example-user" 22 # Disk partitioning
26%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
://www.github.com/hbons/SparkleShare – Current version (as of October 2014) 7.0.2 (Community) 1.0.25 1.1 5.20141013   2.2 5.2.3 3.1.7 1.4 7.0 Release date August
26%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
). In such an environment, a "dedicated" MariaDB container could be run as a replacement for a MariaDB VM: podman run --name maria --volume /var/pods/maria:/var/lib/mysql:Z --net pub_net --ip 192.168.1.10 --mac-address 12:34:56:78:9
26%
Flatpak, Snap, and AppImage
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Quino Al on Unsplash
of the technology. However, there is a solution one size smaller. Youngsters The introduction of the DEB [2] and RPM [3] package formats coincided with the birth of the major distributions Debian and Red Hat

« Previous 1 ... 49 50 51 52 53 54 55 56

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice