Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (306)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 138 Next »

28%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
the rant about large corporations and their sometimes absurd security theater has to do with endpoint security. The answer to this question may be somewhat surprising to some, because it is very relevant
28%
Spotlight on the Kubernetes package manager, Helm
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Nick Fewings on Unsplash
, however, Tiller suffered several problems that were inherent in its design – related to rights management, parallel operations in Helm, and several other key aspects – and consequently were very difficult
28%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
have emerged over the decades. The definitions can be very narrow and specific, because many are meant for use by automatic compiler optimizations. Table 1 Optimizing Execution Speed
28%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
at the very top. The menu also provides functions for searching baskets, sorting them, or generating reports. The gearwheel icon opens the Tools dialog. You have options here to rotate all images
28%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
, the US Foreign Intelligence Surveillance Act (FISA) orders would not apply. Both the ability to rule out access technically and the non-applicability of the CLOUD Act need to be looked at very closely
28%
VDI Basics
03.09.2013
Home »  Articles  » 
 
processing power – as a rule of thumb, you can expect a maximum of a dozen VMs per core if the workload is not very demanding. It applies in particular to storage for all the virtual disks in your virtual PCs
28%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
tasks than the management of wireless users. It is also used by Internet providers, who rely on RADIUS servers to manage their often very numerous users. RADIUS implements the AAA concept: authentication
28%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
of being break-in attempts. Because many mail messages can accrue very quickly, GreenSQL allows you to group messages for sending, and this is where the interval enters the scene: Instead of sending several
28%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
a decade old; amazingly, it still does its job very well. When it comes to PortSentry, simplicity is the key to its efficacy. Not All Implementations Are the Same PortSentry reacts a little differently
28%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
an operating system in the VM explicitly, because the VM kernel can read parts of the host filesystem directly using the Plan9fs (Plan 9 filesystem). That makes the overhead of the solution very small, so

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice