Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (78)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

7%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
users on Lenny will need to access the Experimental repository and then type aptitude install libthinkfinger0 libpam-thinkfinger thinkfinger-tools for the install. Before you modify the existing PAM
7%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 05 op stop interval="0" timeout="60" 06 op monitor start-delay="0" interval="1200" 07 meta resource-stickiness="0" failure-timeout="180" 08 09 primitive stonith_bob stonith
7%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
backup_active = 1 05 backup = 192.168.1.232 06 heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14
7%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
" 05 06 signing_ca_path "/var/chef/ca" 07 couchdb_database 'chef' 08 09 cookbook_path [ "/var/chef/cookbooks", "/var/chef/site-cookbooks" ] 10 11 file_cache_path "/var/chef/cache" 12 node
7%
Apache 2.4 with mod_lua
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Tom Grundy, 123RF.com
:puts("Answer") 07 r:puts("") 08 09 for k, v in pairs(r:parseargs()) do 10 if k=='firstname' then 11 firstname=v 12 elseif k=='lastname' then 13 lastname=v 14 end 15
7%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
06 domains = tuxgeek 07 08 [nss] 09 filter_groups = root 10 filter_users = root 11 reconnection_retries = 3 12 13 [pam] 14 reconnection_retries = 3 15 16 [domain/tuxgeek] 17 auth_provider = krb5 18
7%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
= database.createNode(); 09 // Set properties: 10 dortmund.setProperty("Name", "Dortmund"); 11 cologne.setProperty("Name", "Köln"); 12 // Create edges: 13 Relationship a1_do_k = dortmund
7%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
$password = "test12345"; 09 // In a production web application, the password would be retrieved from a form filled out by the user 10 $hashwert = $hasher->HashPassword($password); 11 12 echo "Password
6%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
/ceph/$name.keyring 04 [mon] 05 mon data = /srv/mon.$id 06 [mds] 07 [osd] 08 osd data = /srv/osd.$id 09 osd journal = /srv/osd.$id.journal 10 osd journal size = 1000 11 [mon.a] 12 host = alice 13 mon
6%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
went to press. I installed Prelude on Debian Squeeze (6.0) and Ubuntu 11.10 for this article. Seeing Past False Positives SIEM systems are, without a doubt, an important component of any modern

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice