Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (656)
  • Article (211)
  • News (24)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 90 Next »

17%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
/share/doc/stunnel*/. The example in Listing 1 shows a very simple configuration that uses stunnel as a plain vanilla TLS client. Listing 1 Stunnel as a TLS Client ; global settings sslVersion = TLSv1.2 chroot = /var
17%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
. The recommendation for a production environment with high availability would then include six (+n ) physical servers (two openQRM servers, two storage hosts, and two virtualization hosts). Linux is used
17%
Thrashing the data cache for fun and profit
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Lucy Baldwin, 123RF.com
, 4, 5 }, // row 0 initialized to 1, 2, 3, 4, 5 { 6, 7, 8, 9, 10 }, // row 1 initialized to 6, 7, 8, 9 ... }; // rows 2 onwards initialized to zeros ** int
17%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
-mentioned time limits in the worst-case scenario. There is a utilization limit of approximately 69 percent for a large number of tasks (i.e., a large n ). On-time processing is still possible, even
17%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
[22] (Figure 6). To access the Developer Portal, you first need to register with Mydigipass.com. With the access credentials you are given, you can log in to the developer portal. Besides detailed price
17%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
SQL [6], MariaDB [7], and PostgreSQL [8]. Entry-Level Relational Searching the web for the keyword "database" shows various techniques, implementations, approaches, and software variants. In this article
17%
Mailman 3.0 – a long time coming
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrey Bayda, 123RF.com
is a professional software tool, and the fan base appreciates its solid operating principles. Version 1.0 was released in mid-1999 [1], followed by 2.0 in 2000. The latest stable branch 2.1 appeared about 12 years
17%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
. Accessed September 22, 2016: https://lwn.net/Articles/665602 Inline TLS performance: https://www.chelsio.com/wp-content/uploads/resources/t6-100g-inline-linux.pdf Kernel documentation: https
17%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
to three collections of hard drives (just a bunch of disks, JBODs). Each array comprises 90 SAS2 disks connected by several controllers, each with a capacity of 12TB. ZFS ensures the required filesystem
17%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
took the form of a context menu; from v1.2.x (used here) a separate tab has several subcategories. In the advanced settings, you can manage the authorizations for remote sessions in the Security

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 90 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice