Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (168)
  • News (18)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 Next »

16%
Program GUIs in Go with Fyne
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Santoshi Guruju on Unsplash
) string { 16 var h hash.Hash 17 18 f, err := os.Open(file) 19 if err != nil { 20 log.Fatal(err) 21 } 22 23 defer f.Close() 24 25 switch hashfunc { 26 case "md5": 27 h = md5.New() 28
16%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
this operation. Thus, in addition to higher performance and better availability, SMB 3 also supports high availability. New in SMB 2.0 and 2.1 SMB was initially developed by IBM and integrated by Microsoft ... Microsoft has introduced several improvements to Windows Server 2012 and Windows Server 2012 R2 with its Server Message Block 3. Hyper-V mainly benefits from faster and more stable access to network ... Hyper-V with SMB 3 ... Hyper-V with the SMB 3 protocol
16%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
to be writable, which translates to decrypted. By the way, if you store backups of your environment in an object store, be it Amazon S3 or a private store (e.g., Ceph), you will want to use the encryption
16%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
algorithms for the search. For example, a stored three-dimensional vector could be assigned the values [1.4, 3.8, -0.8]. Each query to the database is also translated into a vector (e.g., [1.3, 3.5, -0
16%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
the documentation [3] when you are setting up and managing the system. In the following discussion, I concentrate on the free OSSEC version 3.7.0 install on Ubuntu 22.04. After the mandatory Linux update, install
16%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 } 22 } 23 24 Messages { 25 Name = Daemon 26
16%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
recommended as the technical underpinnings. If you prefer to work with Ubuntu, you can go for Ubuntu 22.04. SSL and DNS Required Before the installation can start, you have to meet a few requirements
16%
Flatpak, Snap, and AppImage
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Quino Al on Unsplash
its trustworthiness. However, the major share of today's widespread formats originated in the mid-1990s, when the demands on workstations and servers were far different from today. It is thus
16%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
} 19 20 -re "($|%|>) " { interact } 21 22 timeout { 23 send_tty "No response from $host\n" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables
15%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
17 CREATE DATABASE quantum; 18 GRANT ALL PRIVILEGES ON quantum.* TO 'quantumdbadmin'@'%' 19 IDENTIFIED BY 'wozohB8g'; 20 EOF 21 mysql -u root <22 CREATE DATABASE cinder; 23 GRANT ALL PRIVILEGES

« Previous 1 ... 60 61 62 63 64 65 66 67 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice