Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 154 Next »

11%
Automation with PXE Boot
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Sergey Jarochkin, 123RF.com
files that you use to boot the 64-bit installation. As a tidy sys admin, it is a good idea to put all the files required at boot time into a dedicated folder. In this example, a folder called x64
11%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
and sending DIME messages on the basis of the software that ran at Lavabit. A protocol called DMAP is intended as a slot-in replacement for IMAP, but one that will work with DIME. In the meantime, the project
11%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
is what years ago was called a "cluster." If you want to replicate a directory on a cluster of servers, a lot of software, besides shared storage like NFS, is at your disposal. However, often the learning
11%
Identity and access management with OpenIAM
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Chatree Jaiyangyuen, 123rf.com
these connectors or add new ones. In OpenIAM, rules define which accounts should be provisioned to which target systems. The system appropriately calls these target systems "managed systems." Again, if a change
11%
TheSSS: World's Smallest Server Suite
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © zhao lizu, 123RF.com
via DHCP. If you prefer a static address or need special settings or a wireless connection, you can call on the netconfig tool to help you (Figure 2). In a small question-and-answer session, it guides
11%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
receives a call to arms and acts as a conduit between the resources of the operating system and the server. It's also perfectly possible to enhance SSH and PAM to use two-factor authentication employed
11%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
in 2009, Allspaw and Hammond called for a healthy attitude toward failure: Mistakes would always happen, they said, but you can fix them and learn from them – for example, by keeping the remedy
11%
Set up subdomains with Apache and Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Saniphoto, Fotolia.com
's Encrypt Let's Encrypt [2] is the easiest way to get SSL working on your web server. Fortunately, the approach is identical for Apache and Nginx, except for one small parameter in the script call
11%
What's new in PostgreSQL 9.4
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
simply returns it. A repeat call contains the same information. Using pg_logical_decoding_get_changes(), on the other hand, consumes the changes; when called again, it no longer contains the returned
11%
LibreOffice in the workplace
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © mipan, 123RF.com
? Custom applications. What other (custom) programs use the office suite as an essential part of their processes? How is the office program called and how does the further processing proceed? For example

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice