Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1248)
  • Article (296)
  • News (149)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 170 Next »

16%
Secure passwordless logins with FIDO2 and LDAP
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
the public key as an attribute: attributetype ( 1.3.6.1.4.1.56227.1.1.1 NAME 'fido2pubkey' SYNTAX 1.3.6.1.4.1.1466.115.121.1.5 SINGLE-VALUE ) The OID in the first line is the unique ID of this attribute type
16%
The Present and Future Network
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Erik-Reis, 123RF.com
of how a well-tended network should operate. This issue starts with a story on the state of migration to the IPv6 Internet protocol, including a look at some services that will let you try out IPv6 right
16%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
to a file: { "accept": { "server_time": { "seconds": 1716370731, "nanoseconds": 137298080, "iso8601": "20240522093851Z", "localtime": "May 22 09
16%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
17 CREATE DATABASE quantum; 18 GRANT ALL PRIVILEGES ON quantum.* TO 'quantumdbadmin'@'%' 19 IDENTIFIED BY 'wozohB8g'; 20 EOF 21 mysql -u root <22 CREATE DATABASE cinder; 23 GRANT ALL PRIVILEGES
16%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
, by giving a low-level user access to the Docker daemon, you cannot break an established security model (sometimes called the "principle of least privilege" [6]), which has been used since the early 1970s
16%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
title: Text('Hello World'), 15 ), 16 body: Center( 17 child: Text('Hello World'), 18 ), 19 ), 20 ); 21 } 22 } The source code of an app in Flutter
16%
OpenShift Shifts Pricing
12.11.2013
Home »  News  » 
 
code. According to Red Hat, the latest price reduction brings the cost down to a range of $.02 to $.10 gear/hour. In Red Hat's Silver plan, a "small" gear has 512MB RAM and 6GB disk space. The company
16%
60% of SQL Developers Fail Competence Test
04.03.2014
Home »  News  » 
 
the simple choice of only two possible answers. Thus, a random choice is correct around 50% of the time. Some questions barely beat the "guessing" score of 50%; one had only 53.6% of participants answering
16%
IANA Hands Out Recovered IPv4 Addresses
27.05.2014
Home »  News  » 
 
the path toward IPv6 adoption--the only long-term solution to the impending problem of IPv4 address depletion.
16%
Trend Micro Releases Cloud Security Assessment Tools
29.11.2012
Home »  News  » 
 
, India, Canada, and Australia. The assessments showed that, for overall readiness against targeted attacks, the United States and Canada appeared to be the most ready – scoring 3.3 and 4.6 out of 5

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 170 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice