Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 Next »

10%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
% /run/user/1000 Another set of options for findmnt  that I want to mention includes --real --verbose , which only shows “real” filesystems (which I’m assuming does not include virtual filesystems such as
10%
HPCCM with Docker and Podman
09.09.2024
Home »  HPC  »  Articles  » 
Notice the very large jump in the size of the container image. To prove the container image was built correctly, run and check it. To run the container, I used the following command (virtually identical
10%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
but are virtually useless to users. When attempting to download the ReadyNAS Remote Client on Linux, we were incorrectly offered the version for Mac OS – apparently, because there is no Linux version. This also
10%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
virtually all known attack vectors – including Bleichenbacher's, at long last. Checklist for Maximizing the Exploit Resistance of TLS Upgrading to TLS 1.3 is not an end in itself. To maximize exploit
10%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
pick many examples out of the air without careful consideration, although I suppose virtualization software, which needs hardware innovations to some extent, might fit. You certainly, however, can fly
10%
Seven free blocking filters for ads
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © enciktep, 123RF.com
-hole automatically loads almost 125,000 entries into its DNS service and starts working. Pi-hole was designed for the Raspberry Pi, but it also runs on other SBCs or as a virtual machine. Even in large environments
10%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
, I assume that all services for the operation of an automatic installation framework are running on one system. Ideally, this is a virtual machine (VM) that runs on a high-availability cluster
10%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
range of functions compared with a plain vanilla email client is noticeable when you look at the Contacts , Calendars , Tasks , and Memos buttons at bottom left in the program window. A virtual
10%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
are handled by the provisiond process. For example, DNS zones and virtual machines from VMware vCenter can be automatically monitored and synchronized. HTTP is used to transfer the XML format data to Open
10%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
started is by installing Docker on a host or virtual machine and running the ZAP Docker image as a container. Even inside complex environments, if you can open up TCP port 5900, you will be able to connect

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice