Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 ... 148 Next »

13%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
Among other things, my job involves developing applications in the field of network automation on the basis of the Spring Boot framework, which requires a running Java environment. At the same time
13%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
and developers alike. To access them, press F12. The tools display the source code for a page and help with error analysis (e.g., if a page takes a long time to load). The Network tab lets you check the loading
13%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
to the abstracted EKS cluster's control plane. Positioned in front of the worker nodes, which will serve your applications from containers, is an Elastic Network Load Balancer to ensure that traffic is evenly
13%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
secrecy, the security of all connections depends on the confidentiality of the server's private key. Should the private key ever be stolen or cracked, a hacker can retroactively decrypt sniffed network
13%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
from atop while running an application. The summary at the top covers processor, memory, disk, and network information. Atop adjusts the information according to the screen size, which can
13%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
time the operating system core to be booted – that is, more or less the complete virtual server. Many tasks of a traditional kernel fall away or are reduced significantly, such as managing the network
13%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
of the operations for creating the new DB instance and replicating the data. The Read Replicas are addressed by clients through their individual connection endpoints. To restrict access at the network level
13%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
options for permanent data storage. Monitoring also works independent of the monitored system. However, you can set up integration in Kubernetes far more easily; this applies to both the network
13%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
": [ 10 "Get-NetworkConfiguration" 11 ], 12 "Usage": { 13 "Synopsis": "Run invoke-ifconfig" 14 }, 15 "Parameters": [ 16 { 17 "Name
13%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
to connect to a target system therefore only needs to know its IP address or hostname. The user, on the other hand, no longer needs to remember which path they have to take through a mess of nested networks

« Previous 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice