Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1444)
  • Article (117)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 168 Next »

35%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
-in: Office Web Components: http://www.microsoft.com/downloads/details.aspx?FamilyID=7287252c-402e-4f72-97a5-e0fd290d4b76&DisplayLang=en Active Directory Insight: http://technet.microsoft.com
35%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
with its updated ruleset. Installing Tactical RMM Working as the admin user, type su - tactical wget https://raw.githubusercontent.com/amidaware/tacticalrmm/master/install.sh chmod +x install.sh ./install
35%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
in a single pod and only shares one HTTP port with the outside world. The upstream Nginx reverse proxy takes care of SSL termination. In principle, you just need to convert the Docker Compose file [5] provided
35%
Manage and automate networks
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
. On Linux (e.g., Ubuntu), the developers offer a script that lets you install StackStorm with a single command: bash <(curl -sSL https://stackstorm.com/packages/install.sh) --user=st2admin --password
35%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
restructure the code for other approaches. Loop interchange Swapping inner and outer loops, a typical use is to improve cache data locality [5]. Loop reversal Running the loop
35%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
: Principle 1: Show comparisons Principle 2: Show causality, mechanism, explanation Principle 3: Show multivariate data Principle 4: Integrate multiple modes of evidence Principle 5: Describe
35%
HTML to database with a Perl script
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Danila Krylov, 123RF.com
to the database 036 $dbh = DBI->connect('DBI:mysql:host=mysql.domain.com;database=databasename', 'username', 'password', {'RaiseError' => 1}) or die "Cannot Connect to Database"; 037 038 ### create the master table
35%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
is configured, you can connect it to the service by typing something like: cscli console enroll cl5zgf4qs00 030wjqmvrt7s30 The web console must be running on the computer, and you need to be authenticated
35%
Monitoring changes in Active Directory with built-in tools
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Tobias Tullius on Unsplash
to acquire comprehensive information on what is happening on your network. Infos Microsoft Security Compliance Toolkit 1.0: https://www.microsoft.com/en-us/download/details.aspx?id=55319
35%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
of development, CI processes, operation, and monitoring. Infos Trivy: https://github.com/aquasecurity/trivy NIST Vulnerability Database:https://nvd.nist.gov Aqua Vulnerability Database:https://avd.aquasec.com

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 168 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice