Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 199 Next »

8%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
and execute arbitrary code loaded from LDAP servers when message substitution is enabled. This vulnerability (CVE-2021-44228)(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228) was found in Log4j2
8%
News for Admins
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
 
and will be operated by the JSC. PineTab2 Linux Tablet Announced PINE64 has announced details of the forthcoming PineTab2 Linux tablet. In a lengthy blog post (https://www.pine64.org/2022/12/15/december
8%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
by the Linux Foundation's recent announcement [2] of yet another open source foundation, this one tasked with steering the development of a really under-appreciated tool named osquery [3]. The announcement
8%
Licensing Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Andrew Neilan, 123RF.com
clusters with the Standard edition and do other things that were previously the reserve of the Enterprise/Data Center editions in Windows Server 2008 R2. The Standard and Datacenter editions differ
8%
Collecting application logfiles with Kubernetes
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15, 123RF.com
Path: /var/log/1 - name: logdir2 mountPath: /var/log/2 - name: logcollector image: my-log-collector volumeMounts: - name: logdir1
8%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
, dnsspoof, and macof tools facilitate the interception of network traffic normally unavailable to an attacker due to layer-2 switching.)  Arpspoof (http://arpspoof.sourceforge.net/) is much simpler than
8%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
: the popular buzzword that has fired the imagination of analysts [1], consultants [2], hardware vendors, data center operators, and CIOs of multinational corporations. This continuing euphoria is based
8%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
by admins in a collective way to understand how the system is being used. Overview Before diving into the ins and outs of Remora, keep in mind two things: (1) It is focused on the user, and (2
8%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
website offers some animated examples of what to expect when beautifying your command line. Next, head over to the Dockly GitHub page [2], which contains examples of some of the Dockly command
8%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
since version 2007, which is the basic prerequisite for using the corresponding API. In addition, you need the Exchange Web Services Managed API 2.2 [1]. If you only use Exchange locally, the EWS API

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice