Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (129)
  • Article (40)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 18 Next »

98%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
of quantum mechanics. [3] [4] Peering inside a D-Wave quantum computer. Thom did shed some light on what kind of problems quantum computers may solve ... 48
98%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
$ TOKEN=$(kubectl describe secret $(kubectl get secrets | grep default | cut -f1 -d ' ') | grep -E '^token' | cut -f2 -d':' | tr -d '\t'); echo $TOKEN   bTpzZXJ2aWNlYWNjb3VudDpkZWZhdWx0OmRlZmF1b ... 48
79%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... ). Listing 3 tofu_project/main.tf 01 terraform { 02 required_providers { 03 proxmox = { 04 source = "bpg/proxmox" 05 version = "0.64.0" 06 } 07 } 08 } 09 10 provider "proxmox
61%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... : [devuan] 10 donkey: 11 user: root 12 host: donkey.operationalsecurity.es 13 tags: [devuan] 14 zebra: 15 user: root 16 host: zebra.operationalsecurity.es 17 tags: [devuan] 18 19
61%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
Rubén Llorente ... fails to complete. If the script does not work with your distribution, a manual install will be required [3]. The EasyInstall script has the following prerequisites: Apt or Yum package managers
61%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... had a serviceable Internet connection at home; yet, I was stuck with a pitiful one. My ISP provided 3Mbps of symmetric bandwidth in an age in which urban dwellers had access to subscriptions 10 times
61%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
Rubén Llorente ... iRedMail-related products. The downloadable installer is the product I focus on in this article. The free-tier product, licensed as free open source software under the GPL3, is a set of scripts
38%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
(Figure 3). The management console or the web interface provides an overview. Administrators can disable individual services, change settings, and adjust logging. In this way, you can also boost security ... Secure email with IceWarp mail server 10
34%
News for Admins
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
connectivity and multiple servers Central edge – a regional data center that can control far and closer edge infrastructures RHEL 8.3 (released in November) includes tools like Image Builder, to address ... In the news: Native edge computing comes to Red Hat Enterprise Linux; IBM/Red Hat deals crushing blow to CentOS; Linux Kernel 5.10 is ready for release 48; and Canonical launches curated container
32%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
for your environments with Layer 3 tools. As long as two hosts have any kind of physical communication path, communication on Layer 3 works, even if the hosts in question reside in different Layer 2 segments ... Large environments such as clouds pose demands on the network, some of which cannot be met with Layer 2 solutions. The Border Gateway Protocol jumps into the breach in Layer 3 and ensures seamlessly ... Scalability in Layer 3 ... Scalable network infrastructure in Layer 3 with BGP

« Previous 1 2 3 4 5 6 7 8 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice