Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (642)
  • Article (166)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 Next »

15%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
Shell custom passphrase generator: $Count=Read-host "Number of words" $Separator=Read-Host "Separator" $Content=Get-Content -Path "$PSScriptRoot\Wordlist.txt" $Phrase=Get-Random $Content -Count $Count $Phrase
15%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
in Docker with root privileges, but not in Podman; therefore, the Memcached container needs a persistent volume for the /home/memcache directory to run in Podman. (2) For Zulip to use HTTP behind a reverse
15%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
) or root objects that can be exploited for DCSync attacks can be found here. Nessus also evaluates the cryptographic controls in your AD environment, including insecure encryption algorithms and dangerous
15%
PipeCD for CI/CD
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Kazuo ota on Unsplash
down development. Additionally, large monolithic updates mean that errors and bugs cannot be immediately traced to a clear root cause. Testing does nothing to change this situation. If, after a major
15%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
tuning. I must note that optimization is always to be performed after a code is working correctly and deemed fit for purpose: Sir Tony Hoare's famous quote stating that "premature optimization is the root
15%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
to run these systems. Ansible takes a far more lightweight approach: All you need is SSH access to the command line – either directly as root or with sudo on the target system – to assume the admin role
15%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
alias alerta="docker exec -it root_web_1 /venv/bin/alerta" alerta version The final command outputs the version number and automatically checks whether the containers are running and whether internal
15%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
world will inevitably have heard of Foreman [1]. The software is a classic utility in bare metal lifecycle management and has its roots in the early years of the Linux automation movement. For a long time
15%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
and writing comprehensive, automated root cause analyses (RCAs), the focus is now more broadly the entire topic of observability. Although AI-supported attack detection still plays a major role, Coroot is now
15%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
than French. Users can download the Phraseanet sources from the homepage, unpack them, and set the document root to the subdirectory www in the Phraseanet folder. It is also important to enable the two

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice