Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (105)
  • Article (31)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

25%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
-list +--------------------------------------+-----------+------------------ | id | name | subnets | +--------------------------------------+-----------+------------------ | 42a99eb6-3de7-4ffb-b34e-6ce622dbdefc | admin-net|928598b5 ... OpenStack workshop, part 3:Gimmicks, extensions, and high availability
25%
Build operating system images on demand
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Nataliya Hora, 123RF.com
and needs 900MB of storage space (Figure 1). If you have fast Internet access on the system on which you call the fai-diskimage command, the process is also quick. It hardly takes a minute for the finished
25%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
they are checked. The use of analysis tools such as Mimikatz [3] to grab valid login or session data through the Local Security Authority Subsystem Service (LSASS) are restricted with the rule 9E6C4E1F-7D60-472F
25%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
-persistent-net-generator.rules openSUSE, Red Hat 6 * /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
25%
Manage status messages in CouchDB with MapReduce
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Austin Distel on Unsplash
Design Document with Views { "_id": "_design/queries", "_rev": "6-856a5c52b1a9f33e136b7f044b14a8e6", "language": "javascript", "views": { "by-timestamp": { "map": "function (doc) {\n
25%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
"/> 52"/>3"/>
25%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles. Big Deal? AWS IAM [3] lets you manage access to AWS
25%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
], LANDESK [3], Google's G Suite Mobile Management [4], and bitFit [5]. Herd Immunity One of the most impressive aspects of Netflix's Stethoscope is that, when it displays its findings, it generously
25%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
tool. Enter GlusterFS (Figures 3 and 4). Figure 3: Internally, RHSS relies on Gluster software, and you can use many Gluster commands for storage
25%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L3 caches across all cores or shared L2 and L1 caches

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice