Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (861)
  • Article (206)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 116 Next »

19%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
@tiffy ~]$ su - * pam_usb v0.4.2 * Authentication request for user "root" (su-l) * Device "/dev/sdb1" is connected (good). * Performing one time pad verification... * Verification match, updating one time pads
19%
Managing Linux systems with Spacewalk
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© patrimonio designs, Fotolia.com
the dependencies in the next step. Then you can configure the application interactively with the setup tool or with the use of an answer file (Listing 4). Listing 4 Answer File admin-email = root
19%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
root domain and all production objects residing in other domains seems particularly absurd in today's context when it comes to emergency recovery. Recovering the entire forest depends on successful
18%
Checking Compliance with OpenSCAP
03.09.2012
Home »  Articles  » 
 
. The oscap --id option also gives you the ability to search a system for a specific bug fix. For example, to check to see whether the Advisory “RHSA-2012:0017: libxml2 security update” has been installed
18%
Increasing Throughput with Link Aggregation
26.10.2012
Home »  Articles  » 
 
Windows Server 2008 R2, the question of whether or not link aggregation is available has always depended on the NIC drivers. Windows Server 2012, on the other hand, will support both static and dynamic link
18%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, Mark Nottingham, the chair of the group recently tripped a discussion relating to HTTP 2.0, the first draft of which is due May 2012. One year later, the changes are to be implemented in the scope
18%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
-DIMMs act like single-rank modules. The dual-CPU systems in the Sandy Bridge microarchitecture expected in 2012 will be the first to support LR-DIMMs. Rank DIMMs always have a number of memory chips
18%
Bashtop, a Gorgeous Top-like Tool
10.06.2020
Home »  HPC  »  Articles  » 
 Nvidia K80, which was the last of the Kepler series of GPUs that started in 2012. One could argue that the Kepler series, particularly the K80, was the elbow in GPU computing popularity. Therefore, top -like
18%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
] and recordings [7] are readily available to those who want to learn more about this great tool. Infos "Performance Tuning Dojo" by Federico Lucifredi, ADMIN , issue 8, 2012, pp. 90-92 Amos Waterland
18%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
, the following well-known vulnerabilities were exploited for this purpose: CVE-2012-0158, CVE-2013-3906, CVE-2014-1761 (Figure 1). Today, however, an exploit that Microsoft actually closed in April 2015 (CVE-2015

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 116 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice