Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente 08 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (78)
Keywords

« Previous 1 2 3 4 5 6 7 8

23%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.0 is released. After evaluating several systems, Mlmmj
23%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
programs. This is not always the security solution's fault. An application that is not programmed carefully and fails to comply with RFCs can trip a SIEM signature. In this test, Prelude suspected a DoS
23%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
.0 of the compiler and the specification were released, promising compatibility with future Go releases [3]. Go is thus suitable right now for genuine software projects, not just experiments. The declared goals
23%
Request Tracker – the underestimated open source ticket system
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
Richard CAtA, 123RF.com
The Information Technology Infrastructure Library (ITIL) [1] which was developed back in the 1980s, has established itself in recent years as the standard for IT Service Management (ITSM). One
23%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Password = "YdhKKoy2Huq1CVHwIR" 05 Pid Directory = "/var/run" 06 Query File = "/usr/lib/bacula/query.sql" 07 Working Directory = "/var/lib/bacula" 08 } 09 10 Fileset { 11 Name = "Full Set" 12
23%
The PHP FastCGI process manager, PHP-FPM
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© conceptw, 123RF.com
-1990s. The interpreter is now launched exactly once and then runs in the background. The web server then hands the requests to the interpreter via a TCP port or a Unix domain socket. Because
23%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990s by Sun Microsystems, PAM is available on most Unix-style systems
23%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
://learn.microsoft.com/en-us/security/privileged-access-workstations/esae-retirement Privileged Access Management and Shadow Principals: https://www.teal-consulting.de/en/2018/08/14/esae-series-part-3

« Previous 1 2 3 4 5 6 7 8

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice