Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (173)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 Next »

9%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
in its infancy, the former monopolist browser released the SSL encryption protocol version 2.0 (SSLv2). Version 1 existed only internally in Netscape. Numerous security vulnerabilities were discovered
9%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
virtual instance for development and test purposes on which to carry out the work. Again, Ubuntu 22.04 is a good choice. The steps are quickly completed: Use curl to download the k0s binary, which you
9%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
orchestrated DDoS attacks. In the DDoS attacks on US financial institutions last year, the offenders achieved 20 times the effect of ordinary desktop botnets with a handful of servers. This trend exacerbated
9%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
must ensure that its contents are available redundantly within the whole cluster. Not the least of developers’ problems is dealing with “rack awareness.” If you have a 20-node cluster with RADOS in your
9%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
by the kdump startup script, but only if a protected memory area is also present. To let the original kernel know this, you need to specify the boot loader option crashkernel=XM[ @YM] , where X is the size
9%
Rex
19.02.2013
Home »  Articles  » 
on the administrator’s own machine, which even can be a Windows or Mac OS X machine; the only important thing is that you have a Perl environment in place. To install Rex, first pick up the git versioning tool (using
9%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
9%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.0 release, including time delays
9%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
but fell at the last hurdle for one reason or another. Then I remembered my mighty friend htaccess. Spending about US$ 20 a year to register a really short domain name on one of the briefest top
9%
Quick and easy SaaS provisioning for OpenLDAP
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © scyther5, 123RF.com
the identity provider (IDP) URL from Okta's per-app SSO setup instructions and download the X.509 certificate; then, upload them to your admin account with the SaaS service provider. As users try to log

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice