Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (119)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 151 Next »

16%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 } 22 } 23 24 Messages { 25 Name = Daemon 26
16%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
recommended as the technical underpinnings. If you prefer to work with Ubuntu, you can go for Ubuntu 22.04. SSL and DNS Required Before the installation can start, you have to meet a few requirements
16%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
Most Internet services rely on the Transmission Control Protocol (TCP), an interprocess communication protocol that dates back to the 1980s, an era when data streams were more like trickles by today
16%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
be subjected, it’s critical to capture important changes and events made by users and processes on your running systems. Highlighting such changes could potentially point toward something as innocuous
16%
Laying out documents with Markdown and Pandoc
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Edgar Chaparro on Unsplash
class: https://github.com/josephwright/beamer/ S5: https://meyerweb.com/eric/tools/s5/ DZSlides: http://paulrouget.com/dzslides/ Slidy: https://www.w3.org/Talks/Tools/Slidy2/#(1) Slideous
16%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
(Listing 3). Listing 3: Configuring Lmod init Scripts [root@test1 profile.d]# ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/modules.sh [root@test1 profile.d]# ln -s /usr
16%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
for Internet Security (CIS) [3] – a kind of best practices guide for the use of containers (Figure 1). Figure 1: Docker Bench for Security checks containers
16%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
in Windows Azure; you will find this on the Azure portal [3]. The familiar Windows backup interface is used for backing up and restoring. You can also control the process in Windows PowerShell; a separate
16%
Millions of Intel Processors Are Vulnerable to Attack
21.11.2017
Home »  News  » 
 
Earlier this year, there were multiple reports of vulnerabilities in Intel’s Management Engine (ME) that allows remote management of corporate systems. The vulnerabilities were discovered
16%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
); 19 printf("source: %s\ntarget: %s\n",source,target); 20 return 0; 21 } Figure 3: Splint warns the programmer of a likely out

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice