Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (25)
Keywords

1 2 3 Next »

100%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
. Unfortunately, version 2.2, available since September 2011, is no longer up to date as far as software packages are concerned, which in some cases could lead to weaknesses in security. Version 2.2 runs on top ... Admins of small businesses who want to cover all their infrastructure requirements with a single server are the target group of small-business servers. In this article, we introduce three Linux
63%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
shows the typical structure of an IoT system comprising three layers: devices, the edge, and the back end. The layers are connected by networks. The applications on the devices communicate
62%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
the application [6], click the Run Code button (typically a Play icon in the top right corner; Figure 3). Alternatively, you can run the project with the command dotnet run
62%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
, a password should comprise at least eight characters and be complex. It should contain upper- and lowercase letters, numbers, and nonstandard characters (i.e., three to four different types of characters
62%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
the evidence. This problem is not restricted to the digital world but applies equally to, say, forensic medicine. The advantage of collecting digital evidence has always been that the investigator can create
61%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
Flow or PyTorch or JAX to use the framework effectively. You can learn Keras and use all three frameworks. Then, if you want, you can pick one framework to learn more in depth, having learned the concepts
61%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
Example Applications Example Source PlutoSliderServer Examples A demonstration of an assortment of widgets https://pluton.lee-phillips.org/sliders/uiDemo.html Ptolemy
60%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
actors." The reason for the ban was the possibility of discovering security vulnerabilities in vehicles. The Flipper manufacturer came out on top, however, with the support of the "stop the absurd ban
60%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
on the same file. Therefore, three factors are important: the type of function used to access the file area, the time-based sequence of function calls onto a file, and the affected byte areas inside the file
60%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
are accomplished on Rocky Linux in just three lines: dnf install clamd clamav freshclam clamscan /home Numerous online tutorials can help you set up ClamAV. As a bonus, ClamTk (Figure 1) and ClamWin even offer

1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice