Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 160 Next »

38%
Load test your website with Siege
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Aarón Blanco Tejedor on Unsplash
. Although running Siege does not require much expert knowledge, interpreting its result is what you should care about, and I will try to make that part simple. Running Siege requires sudo privileges, so
38%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
, the identity itself is not important, the only important thing is to identify the same person beyond any doubt. To use SSO, you are not dependent on the three major players, Google, Facebook, or Open ... Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat
38%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
-level operation that re-encrypts all the tablespace keys and saves them back to the tablespace header: mysql> alter instance rotate InnoDB master key; However, the process does not re-encrypt or decrypt
38%
Pattern matching dispute in Python 3.10
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Steve Harvey on Unsplash
does not distinguish between private and public variables as strictly as Java, it is a widely used convention that is also specified in the Style Guide for Python Code [7]. However, the proposed match
38%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
, ransomware often does not become active directly. Instead, it first looks at common IT processes, existing network drives, and temporarily mounted backup media. At the right moment – preferably when
38%
Save sudo logs on a remote computer
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by the blowup on Unsplash
and might not offer an init script yet. On Fedora 33, I used the following packages: rpm -qa sudo* sudo-1.9.2-1.fc33.x86_64 sudo-logsrvd-1.9.2-1.fc33.x86_64 However, the sudo-logsrvd package does not yet
38%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
the feeling when you have added a filter rule to your ruleset and realize afterward that it does not serve the intended purpose. Iptables as a packet filter is still the tool of choice on Linux systems. However
38%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
: Make sure the Nginx web server is installed and started. The maintainer does not have to give a specific command like yum install nginx because CFEngine maintains a library of commands for each supported
38%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
symmetric active crypto-NAK packet, it will peer with the sender, bypassing authentication typically required to establish a peer association." Although a time protocol does not provide direct access
38%
News for Admins
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
 
's even a countdown clock (https://pythonclock.org/) to tick away the days, hours, minutes, and seconds before we say goodbye to Python 2. What does this mean? It means a number of critical Python projects

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice