Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 101 Next »

15%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
the Internet service IFTTT [2], Huginn automatically triggers actions for certain events (e.g., if the text on a news page changes or the online shop reduces the price of the laptop you have your sights on
15%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Suslov, 123RF.com
in this article, executed on a Linux laptop, are based. A source download and binaries are available for Linux, macOS, Windows, and BSD. Installation from the binary packages is simple, because all
15%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
can authenticate to the cloud platform. (I do this as the chris user, not the root user, to limit the permissions used on my laptop.) Next, agree to the pop-up in your browser that asks if you
15%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
offers a whole range of models with different capabilities, with prices ranging from EUR29 to 109 (VAT not included; or about $25--$88). They also produce a line of Qubes OS-certified laptops and Nextcloud
15%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
teaches performance analysis and tuning for various training service providers. Thanks to Jens Axboe for answering many questions and to Teamix for providing the test laptop.
15%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
that sync with AD. At the same time, users' work devices have become more mobile. Even at company sites, it is common practice to take a laptop to meetings in other teams' offices and conference rooms
15%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
information about the ripe.net domain. Because it distributed the attack against Spamhaus over no fewer than 30,000 DNS resolvers using a remote-controlled botnet, none of the DNS server operators even noticed
15%
VMware Tools
15.10.2013
Home »  Articles  » 
in the VMware cloud stack is vSphere, the software for virtualizing data centers, which in turn is based on the ESXi hypervisor and allows complete remote administration via a SOAP API with the aforementioned
15%
TinyDNS
02.03.2012
Home »  Articles  » 
 
try querying your name server remotely with the host command: host yourdomain.com While you’re at it, try tailing the logfile like this tail -f /etc/tinydns/log/main/current | tai64nlocal
15%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
attacks can be launched against production systems on the network. Whether or not an attack can be registered by a honeypot ultimately depends on whether it is possible for a remote attacker to identify

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice