Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (689)
  • Article (207)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 102 Next »

17%
Virt-builder generates VM images in a flash
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Petris, fotolia.com
"Libguestfs" by Richard W.M. Jones, Linux Magazine , September 2010, issue 118, pg. 22 New tool: virt-builder: http://rwmj.wordpress.com/2013/10/05/new-tool-virt-builder/ Virt-builder templates: http
17%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
include some of the biggest names in IT, social media, and the entertainment industry, including Amazon Web Services, AOL, Apple, eBay, Facebook, Netflix, and HP. However, Hadoop 2.2.x is especially
17%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
, with 45 percent saying it will increase slightly and 32 percent stating it will increase significantly. Only 22 percent of respondents claimed open source adoption will remain the same and one percent
17%
News for Admins
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
 
3297841472b4e53e22e53826eea9e483d993e5) (by Red Hat's David Howells), the notification queue will also "…have the ability to cache your kerberos tickets in the session, user or persistent keyring so
17%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
servers and sysadmins. These levels of growth always sound absurd when peddled by analysts. Cisco predicts 50 billion devices by 2020 compared with 12.5 billion in 2012. To get some intuition about
17%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
17%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
Control Manager on computer 'XENAPP0'. This operation might require other privileges. At line:1 char:12 + Get-Service <<<< -ComputerName XENAPP0 + CategoryInfo : NotSpecified: (:) [Get
17%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
, the users from the admin group and sudo , can do everything, and the remaining users can do nothing. Listing 1: Ubuntu 12.04 /etc/​sudoers file # Redefine environmental variables: Defaults        env
17%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator and Mydigipass.com. Info [1] RSA Security [2] SafeNet [3] SMS Passcode (in German) [8] LSE LinOTP [9] Mobile-OTP [10] Mydigipass API [11] Demo token [12] Vasco [13] Mydigipass plugins
17%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
the /dev/ pmem pseudodevice, which you can leverage to dump the memory content with dd . Figure 1 shows the complete process for an Ubuntu 12.04.1 LTS system

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 102 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice