Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (94)
  • Article (29)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 Next »

23%
Remote desktop based on HTML5
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Phanlop Boonsongsomnukool, 123RF.com
quickly view the password hash at the command line with the md5sum utility: # echo -n | md5sum -t 319f4d26e3c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password
23%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
's S3. Scalability, (high) availability, and manageability were and still are the essential characteristics that Sheepdog seeks to provide. For Morita, setting up Ceph, which already existed at that time
23%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
to Virtualization.'' Alternatives to Virtualization According to one very nicely written page [3], KVM will still work without the hardware extensions, but it will be much slower. It is also possible
23%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
Version: networking.istio.io/v1alpha3 02 kind: Gateway 03 metadata: 04 name: wordpress-gateway 05 spec: 06 selector: 07 istio: ingressgateway 08 servers: 09 - port: 10 number: 443 11 name: https
23%
Guacamole: Remote Desktop
04.02.2013
Home »  Articles  » 
 
with the md5sum utility: echo -n | md5sum -t 319f4d26e3c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password to the configuration. Of course, the hashed password should
23%
Rethinking RAID (on Linux)
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © nikkikii, 123RF.com
identified the following physical drives that I will be using in my examples: $ cat /proc/partitions |grep -e sd[c,d] -e nvm 259 0 244198584 nvme0n1 259 2 244197543 nvme0n1p1 8 32
23%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
algorithms are round robin and least connected, which are most commonly used in LVS clusters. Configuring the Piranha Infrastructure Piranha [3] is a clustering product from Red Hat that is based on the LVS ... 3
23%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
"href": "http://www.linux-magazine.com/NEWS/Gartner-worldwide-server_sales_drop" 08 } 09 ], 10 "title": "Gartner: Worldwide server sales drop", 11 "content": "

\n

23%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
have been created over the last few years, including Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), and JiffyBox. In the US, they are joined by providers such as Go
23%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice