Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 200 Next »

12%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
on private networks. That said, numerous servers with publicly accessible SSH ports can be found on the network, including Internet of Things (IoT) devices and virtual server and infrastructure providers
12%
Security after Heartbleed – OpenSSL and its alternatives
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Ilya Masik, fotolia.com
-time developer is actually working on pushing forward with OpenSSL. In response to Heartbleed, the Linux Foundation announced at the end of April that it would financially support OpenSSL to provide more manpower
12%
Coordinating distributed systems with ZooKeeper
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © smileus, 123RF.com
of the naming, grouping, or configurations of the menagerie. Thanks to ZooKeeper [1], which is available under the Apache 2.0 license, not every cluster has to provide a synchronization service itself
12%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
on and who else has machines on the same host. You have no control over the software that runs on the other VMs or on how well the other VMs are maintained. Instead, you need to trust the provider
12%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
of Prometheus. In this article, I focus on retrieving metrics. Figure 1: If you access the metrics subpage, Prometheus provides a number of internal metrics
12%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
environment provides impressions of the insights Prometheus delivers into a Kubernetes installation. The Prometheus configuration is oriented on the official example [3]. When querying metrics from
12%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
advantages for Linux distributors and program providers, the container-based approach has established itself as the de facto standard. Containers offer software providers in particular the ability to deliver
12%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
entire networks or hosts and search for specific vulnerabilities. Google comes to the aid with its Tsunami [1] offering. Because it is not an official project, Google does not provide any support
12%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
controller variant can intervene at either of these two points. One example of such a controller is LimitRanger, which provides pods with the default request resources while not allowing pods to grab more
12%
Package management tools for Windows
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
and launch the installer (EXE or MSI) and click through the graphical wizard, even though the same information is typically provided every time. All of the programs support unattended installation, but hardly

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice