Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (69)
  • Article (28)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 Next »

36%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
applications do not use it for I/O (e.g., /home). NFS is simple, easy to understand, and has known failure modes. One of the most common questions about NFS configuration is how to tune it for performance
36%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
/pam.d/system-auth, although other Linux distributions call it /etc/pam/common-auth. You can enter all the libraries against which you want to authenticate your users in the file (Figure 5
35%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
who monitors Fortune 500 banks, as well as large oil companies. He showed me how many of these organizations still use older Windows and Linux systems to provide essential banking services and control
35%
Small-board computers
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Author, 123RF.com
.041GFLOPS for double-precision. This level of performance won't get a cluster of Raspberry Pi's on the TOP500 any time soon, but that's not the real point of the RPi. The point is to get fully featured
35%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
to many drives, including PATA, SATA, and the many varieties of SCSI, SAS, and solid-state drives, as well as NVM Express (commonly referred to as NVMe) and even eMMC drives. The standard provides
35%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
-Managed, Please What all these services have in common is that users transfer their data to a third party for fiduciary management. Most cloud services today only share the means of transport and entice users
35%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
] that supports authenticated access to web applications. OAuth protocol is commonly used in applications where you can log in to a service with the login credentials of another service (e.g., with a Windows Live ... potential approaches for common use cases.
35%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
. The script automatically creates mailboxes on the destination server and uses the plink.exe executable for secure connections, Common Internet File System (CIFS) for access, and .pst files for data migration
35%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
that Mike recommended. Vehicle is the generic term for car, motorcycle, and truck. Modern man is related to early hominids and other species of great apes. All these statements have one thing in common
35%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
and various interfaces in such a way that this SSO feature works with a variety of SaaS offerings. Currently there are more than 2,500 software offerings, so chances are high that the desired software supports

« Previous 1 ... 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice