Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • News (193)
  • Article (79)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 Next »

16%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
or a certificate exchange. Doing without a passphrase can lead to security problems. For instructions on how to set up SSH appropriately, see the Zamanda wiki [5]. ssh_keys then points to the file
16%
WordPress, Joomla, and Drupal compared
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Zoya Fedorova, 123RF.com
. Extensions often comprise several components, modules, and plugins, so this strategy leads to additional maintenance overhead. Because of the popularity of the three CMSs, almost every imaginable occasion
16%
Monitoring with System Center 2012 R2 Operations Manager
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © dotshock, 123RF.com
in good time to warnings and error messages to resolve problems before they lead to major failures of the Active Directory environment. To monitor an AD environment with SCOM, you must import
16%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
, Germany, who has been working with the operating system since 1994 as an author, trainer, consultant, and journalist. Today, the Conch diplomat, Minister of the Universal Life Church, and Jedi Knight leads
16%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
expect from it. However, each hyperscaler uses different tools, some of which might be specific to a manufacturer, leading to gaps in the test suite. Moreover, the existing SSD error correction functions
16%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
_VAR:Cookie, $HEADERS_VAR:Content-Type, $HEADERS_VAR:Connection, $HEADERS_VAR:Accept-Encoding. The score indicates the value for each event. Thus, you can create signatures that do not lead to the firewall blocking
16%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
, it should not lead programmers always to formulate join subqueries in this way. The previous example can easily be rewritten as a conventional JOIN. COPY FREEZE When a large amount of data is loaded
16%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
, although this is not necessarily the same relay as the one used on the outbound route. This variation in the path can lead to the typical problems associated with asymmetrical routing; for example
16%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
. Figure 6: In IOzone's stride read test, LizardFS (yellow) takes the lead with smaller file sizes. CephFS is tan, and Ceph RADOS is green. In the writing test, IOzone essentially confirmed the results
16%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
vulnerabilities – or at least help fix them The scopes of these five tasks lead to a number of key and auxiliary functions aimed at analyzing, visualizing, monitoring, and, if possible, automatically reducing

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice