Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1130)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 158 Next »

13%
Fedora 21 Server Edition
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
 
-based services. Rolekit – Ultimately, Rolekit will allow users to declare a machine as a particular kind of server (e.g., database, mail, file, etc.) and have the installation and configuration details handled
13%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
reason to do this first is that you always need the tools (the attack adaptors) installed before running them through Gauntlt. The following commands will get you started: $ apt install python-pip $ pip install
13%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
the tools (the attack adaptors) installed before running them through Gauntlt. The following commands will get you started: $ apt install python-pip $ pip install --upgrade setuptools $ pip install --upgrade
13%
ClearOS 7 Community Edition and Kali Linux
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
 
  ClearOS 7 Community Edition (64-bit Install) ClearOS [1] provides a simple and easy
13%
Getting data from AWS S3 via Python scripts
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © erikdegraaf, 123RF.com
copies S3 files from the cloud onto the local computer. Install this using pip3 install --user awscli and then answer the questions for the applicable AWS zone, specifying the username and password
13%
Rocky Linux 9 (x86_64)
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
.17.7 The Rocky Linux team recommends a fresh install of major versions rather than upgrading older versions. Infos Rocky Linux: https://rockylinux.org Build system source code: https
13%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
that still have a SHA-1 signature: You can no longer install them on a Fedora 36 system [8] because the system cannot verify the package signature. The correct approach is to ask the package vendor to sign
13%
Exchange Server through 2025
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Jon Tyson on Unsplash
a vulnerability that affected many on-premises Exchange servers and highlighted how important it still is to maintain your on-premises Exchange installation. It took some time to eliminate the vulnerability
13%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
(install from Ruby Gems with gem install iStats) [5]. iStats provides convenient access to temperature, battery, and fan speed data on macOS systems (Figure 3). Its simple and easy-to-use interface belies
13%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
as yet another file in the boot directory. It is automatically created when a new kernel is installed and deleted again when the kernel is removed from the system. But this initial ramdisk plays

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice