Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (333)
  • News (247)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 166 Next »

12%
TinyDNS
02.03.2012
Home »  Articles  » 
 
the directory structures needed: tinydns-conf tinydns tinydns /etc/tinydns 12.34.56.78 This command tells TinyDNS that you want to run it as user tinydns under group tinydns to keep security threats
12%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
for this example: Order Deny,Allow Deny from All Allow from 12.12.12.12 Allow from 23.23.23.23 Allow from 34.34.34.34 This example denies access to everybody except the IPs listed, which follows the very sensible
12%
News for admins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
CC BY 3.0
be in memory," said Guinet on the project page. The WannaCry ransomware attack has been the worst attack of its kind. The attack started on Friday May 12, 2017 and infected more than 230,000 computers across
12%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
": "glusterfs-cluster" 06 }, 07 "subsets": [ 08 { 09 "addresses": [ 10 { 11 "ip": "192,168,121,101" 12 } 13 ], 14 "ports
12%
Planned Obsolescence Needs to be Obsolete
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
out the window for tech that I'll have to replace in 12 to 18 months. And now we're told that certain vendors slow down tech that is only slightly out of date. That's taking planned obsolescence a bit
12%
Into the Cloud for Security
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Tomasz Pacyna, 123RF.com
to sleep at night knowing that your network is vulnerable, unwatched for at least 12 hours a day, and probably compromised so badly and so stealthily that you won't be able to find that you've been
12%
The Dilemma of the Ten-Second Commute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Larry Ewing (lewing@isc.tamu.edu) and The GIMP; Tux added protection by Maria
it that problematic. Yes, we spent a lot of time working. Rather than a typical eight to nine hours per day, we logged somewhere between 10 and 12 hours. We were also on call, and once the layoffs started in October
12%
Security is Everyone's Problem
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Rancz Andrei, 123RF.com
that the opposite is true. It's a little better than leaving the doors and windows unlocked but, in reality, not that much better. We assume that our 12-character complex passwords protect us, but they don't. Sure
12%
IMAP 4 protocol extensions
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Christian Draghici, 123RF.com
have been read   a002 OK [READ-WRITE] SELECT completed Client may make changes to mail a003 fetch 12 full   Client requests information about message 12
11%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
and architecture are available at http://www.lbl.gov/cs/html/greenflash.html, and you can read the complete research paper online at http://james.agu.org/index.php/JAMES/article/view/v3n12/v3n12HTML.

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice