Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (940)
  • Article (295)
  • News (166)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 141 Next »

15%
Troubleshooting Kubernetes and Docker with a SuperContainer
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Sergey Nivens, 123RF.com
and lsof tools to view TCP port 80 and also check the internal eth0 interface IP address, which reports that IP address 172.17.0.2 is bound. I used the networking tools in Figure 6 to check
15%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
the number of desired container machines to be created. The names of the created container machines are a combination of the cluster name, the machines name, and the count index starting from 0. The image
15%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
that can be deployed on both 4G and 5G technology. A 5G campus network is designed to meet special requirements (e.g., to allow Industry 4.0 [1] applications to communicate). The market for 5G campus
15%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
.4' 02 services: 03 keycloak: 04 container_name: keycloak 05 image: quay.io/keycloak/keycloak:17.0.1 06 ports: 07 - 8080:8080 08 environment: 09 - KEYCLOAK
15%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
because access tokens in the OAuth 2.0 standard are usually only valid for one hour, after which you need to obtain a new token, which involves an in-depth reappraisal of the access context. At the end
15%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
OS and Linux, use the binaries for your choice of OS. By default, the web interface can be accessed on https://127.0.0.1:3333/ . The username is admin , and the password is output on the console. Before you can
15%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
: Mbed TLS [4]: The new name of PolarSSL after the acquisition by ARM. It's an embedded-friendly TLS (DTLS since version 2.0) library. Implemented in C and easy to port to new targets. TinyDTLS [5
15%
Network virtualization with OpenDaylight
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
the remote controller at 127.0.0.1:6633 . In other words, the control plane is missing. Just to confirm this, try to ping host h3 from host h1. You will see a message telling you that the host is not reachable
15%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
name: "Jon's key" 15 [...] 16 Plan: 2 to add, 0 to change, 0 to destroy. The -out parameter generates a plan that guarantees that Terraform does exactly what the output is currently
15%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
risks, quantifying possible data loss and responding to attacks. Apache Spot [3] uses big data and modern ML components to improve the detection and analysis of security problems. Apache Spot 1.0 has been

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 141 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice