Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (874)
  • Article (209)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 120 Next »

9%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
, with 45 percent saying it will increase slightly and 32 percent stating it will increase significantly. Only 22 percent of respondents claimed open source adoption will remain the same and one percent
9%
News for Admins
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
 
3297841472b4e53e22e53826eea9e483d993e5) (by Red Hat's David Howells), the notification queue will also "…have the ability to cache your kerberos tickets in the session, user or persistent keyring so
9%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
on. Despite the mass appeal, Intel has pushed ahead with Itanium but has suffered the loss of support from Red Hat, Microsoft, and now Oracle. On March 22, Oracle announced in a very terse statement
9%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
was received [2]. Modular Extensions for Apache Apache version 2.2 and newer has a mod_reqtimeout extension that lets you configure the RequestReadTimeout option, which you can use to set different request
9%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
servers and sysadmins. These levels of growth always sound absurd when peddled by analysts. Cisco predicts 50 billion devices by 2020 compared with 12.5 billion in 2012. To get some intuition about
9%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
9%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
Control Manager on computer 'XENAPP0'. This operation might require other privileges. At line:1 char:12 + Get-Service <<<< -ComputerName XENAPP0 + CategoryInfo : NotSpecified: (:) [Get
9%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
, the users from the admin group and sudo , can do everything, and the remaining users can do nothing. Listing 1: Ubuntu 12.04 /etc/​sudoers file # Redefine environmental variables: Defaults        env
9%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator and Mydigipass.com. Info [1] RSA Security [2] SafeNet [3] SMS Passcode (in German) [8] LSE LinOTP [9] Mobile-OTP [10] Mydigipass API [11] Demo token [12] Vasco [13] Mydigipass plugins
9%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
the /dev/ pmem pseudodevice, which you can leverage to dump the memory content with dd . Figure 1 shows the complete process for an Ubuntu 12.04.1 LTS system

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 120 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice