Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (898)
  • Article (272)
  • News (38)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 122 Next »

17%
News for Admins
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
 
-3786), which affect OpenSSL version 3.0.0. These vulnerabilities have been addressed with the release of OpenSSL 3.0.7, so users should update now. "Users of OpenSSL 3.0.0--3.0.6 are encouraged to upgrade to 3 ... OpenSSL has issued an advisory (https://www.openssl.org/news/secadv/20221101.txt) relating to two vulnerabilities (CVE-2022-3602 and CVE-2022-3786), which affect OpenSSL version 3.0.0.
17%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
The Linux kernel already contains a variety of packet filters, starting with ipfwadm and followed by ipchains and iptables. Kernel 3.13 saw the introduction of nftables [1], which uses the nft tool
17%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, there’s building construction, in which software has “architects” that help with the “blueprint” of the code and then turn it over to the software developers who “build” it. The second metaphor is complex
17%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
to reduce the zoom, use the m key to "minimize" (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts with the plus (+ ) key. Likewise, you can
17%
Infrastructure as Code with Terraform
20.06.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© fotolia.com
for the word yes to continue and apply the change.The outcome is much quicker than before, as Figure 6 shows: et voila!An updated A record will be propagating around the Internet’s name servers
17%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
styles. Carlos Morrison published a message passing interface (MPI) [1] pi implementation [2] in his book Build Supercomputers with Raspberry Pi 3 [3]. Speed Limit Can you make the code twice as fast
17%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
that operates various research facilities on behalf of the U.S. government, provides comprehensive information on IT security. MITRE developed the CVE system, for identifying and assigning unique identifiers ... The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure. ... MITRE ATT&CK & D3FEND
17%
Open source cloud technologies at a glance
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
alhovik, 123RF
the beginning, thanks to its compatibility with Amazon Web Services (AWS) and EC2 S3. The current version is still 2.0.3 from 2011. It is worth mentioning that version 1.5 of Eucalyptus was officially integrated
17%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © 123RF.com
Generator: http://awspolicygen.s3.amazonaws.com/policygen.html Multifactor authentication: http://aws.amazon.com/iam/details/mfa/
17%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
other values passed in end up in the rest array. The three dots (splats) show that the caller can pass in an arbitrary number of values. The a 1,2,3,4,5,6 statement thus would output 3,4,5,6 . If you

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 122 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice