Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1062)
  • Article (333)
  • News (113)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 152 Next »

16%
Shell in a Browser
15.03.2012
Home »  Articles  » 
 
, in many cases, the firewall is so restrictive that nothing, apart from HTTP(S), gets through. In this case, PHP Shell and Shell In A Box can help you gain shell access to your server. PHP Shell PHP Shell
16%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
6d2feb5e84bad9184441170d4898 mariadb latest mariadb@sha256:12e32f8d1e8958cd076660bc22d19aa74f2da63f286e100fb58d41b740c57006 RepoId mariadb latest b468922dbbd73bdc874c751778f1ec0ec10817691624976865cb3
16%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
as a service (SaaS), although this is not a requirement in terms of strategy. The extension part in XDR specifically refers to endpoint detection and response (EDR), as well as network detection and response
16%
News for Admins
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
 
Linux will be a community-based 1:1 binary replacement for Red Hat Enterprise Linux and currently ships with Gnome 3.32, Linux kernel 4.18.0-240.22.1.el8, SQLite 3.26, virt-what 1.18, Samba 4.12.3, DNF 4
16%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
AES128-GCM-SHA256 \ 19 AES256-GCM-SHA384 \ 20 AES128-SHA \ 21 AES256-SHA \ 22 DES-CBC3-SHA" 23 24 # Only with Apache 2.2.24+ and Apache 2.4.3+ 25 SSLCompression Off 26 27 SSLSessionCache shmcb
16%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
be IP addresses to much more humanly digestible addresses. Thankfully, we no longer live in the early days of the Arpanet (precursor to today’s Internet), where we had to transfer large host files from
16%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
relative to the data values. For example, if the difference between two numbers is 100.0, but you are working with values of 10^8, then the difference (0.001%) might not be important. It’s really up
16%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
]$ cd ~/encrypted [laytonjb@test1 encrypted]$ ls -l total 8 lrwxrwxrwx 1 laytonjb laytonjb 24 Sep  4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv, -rw-rw-r-- 1 laytonjb laytonjb 18 Sep  4 15:12 WvPjlWtCaq5g9hE1
16%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
. For example, assume a user has an application hanging on a node. One of the first things I want to check is the load on the node (i.e., whether it’s very high or very low). Rather than repeatedly typing uptime
16%
What's New in NetworkManager
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Anukrati Omar on Unsplash
=Ethernet DEVICE=enp0s31f6 BOOTPROTO=dhcp Listing 1 shows a complete profile for a WLAN connection set up for a network interface card named wlp0s20f3 . The individual configuration options can be found in the /usr

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 152 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice