Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 98 Next »

7%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
Manually typing in device IDs for asset tracking can quickly become a major chore in large environments. Automated entry with a radio frequency identification (RFID) system saves valuable time
7%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
display, it only offers 16:10 resolutions via the data display channel (DDC) interface [2]. In addition to its native 16:9 resolution, the laptop display also supports a number of lower resolutions
7%
OpenFlow-capable Zodiac WX access point
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Florian Biedermann on Unsplash
, the device works like a normal access point. Go with the Flow The OpenFlow protocol lets you manage traffic flows according to rules. Simply put, these rules comprise a block of filters followed by a set
7%
Interprocess communication essentials in Perl
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Carsten Reisinger, 123RF.com
its own execution resources, including its own allocation of CPU time. A process can interact with other processes in a number of different ways, as you'll see in this article. The support for IPC
7%
Dos and don'ts of backing up Kubernetes storage
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Alexander Bedrin, 123rf.com
and persistent memory. One approach could be to migrate the old backup technologies to the containers at the same time, but it's not that simple. Classic client-server backups do not work, precisely because
7%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
. Infos Clonezilla: https://clonezilla.org Restoring files with Time Machine and Spotlight: https://support.apple.com/guide/mac-help/recover-files-time-machine-spotlight-mh15136/mac Time
7%
Five graphical database front ends
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © yewkeo, 123RF.com
software solutions make using and managing even complex databases easier. To ensure a database application's efficiency, as well as acceptance among non-IT employees, the decisive factor is how easily it can
7%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
into one of the other formats without loss. YAML is the preferred format of the Ansible automation tool, which is used here for as-code automation. Thanks to its modular structure, Ansible can control
7%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
by aws_escalate.py. The two tools complement each other. SkyArk will work for both AWS and Azure. If you are interested in exploring SkyArk, the instructions to install it are on its web page and are very
7%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
Within a couple of hours, an experienced Internet attack specialist can bring your server infrastructure to its knees. In many cases, the barn door through which the attackers gain entry

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice