Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (164)
  • Article (31)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 20 Next »

17%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
database remote:localhost/discworld root plocal 03 04 create class Person extends V; 05 create property Person.birthday date; 06 07 create class Book extends V; 08 create property Book
17%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
program that breaks out of jail – system privileges (Figure 1). Fortunately, root privileges are not necessary: Most distributions give normal users from the kvm group access to /dev/kvm. It is therefore
17%
Set up subdomains with Apache and Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Saniphoto, Fotolia.com
ServerName www.example1.de DocumentRoot /var/www/www.example1.de/ The two configurations are not yet live, however, so you either need to link the configuration
17%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
a public CA. A full certificate authority is initially more expensive than a self-signed scenario, but as soon as the infrastructure is available and the root key is distributed to all users, it works
17%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
MAINTAINER Yves Schumann 03 04 ENV WORK_DIR=/data/work \ 05 DEBIAN_FRONTEND=noninteractive \ 06 LC_ALL=en_US.UTF-8 07 08 # Mount point for development workspace 09 RUN mkdir -p
17%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
_facts: no 06 vars: 07 localfw: 10.0.2.90 08 localadmin: admin 09 localpw: "" 10 vdom: root 11 lnet: 10.0.2.0/24 12 rnet: 10.100.0.0/17 13 remotefw: "{{ stackinfo
17%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
peering. Listing 1 Base and Network Tasks 01 - name: Load Data 02 include_vars: "{{ datafile }}" 03 tags: getdata 04 05 - name: SSH Key 06 ec2_key: 07 name: ansible-admin-key 08
17%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
string. To start the script, store it as hello.lua in the document root (if you followed the “Quick Install” example, this is ~/httpd/htdocs ). Now you can access the function in your browser by typing
17%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
rule phishing_pdf { 02 03 meta: 04 author = "James Stanger" 05 last_updated = "2017-09-12" 06 category = "phishing" 07 confidence = "high" 08 threat_type = "phishing exploit" 09 description
17%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
are the root causes of breakdown-prone software. As early as 1972, scientists described the first, albeit theoretical, buffer overflow attack [1], and SQL injections [2] have been around since 1998. Both still

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice