Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 58 Next »

69%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management ... as per RFC 3484, which defines the rules by which the various IPv6 addresses are used. This policy can be displayed by typing ip addrlabel or ip addrl (Figure 2). The label determines the priority ... Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management ... IPRoute2: arp, route, and ifconfig in a Single Tool ... IPRoute2
68%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
of Scout2 means that it adapts perfectly. The act of inspecting the vast array of AWS configurations using Identity Access Management (IAM) Read/List rules is surprisingly speedy, and once it's completed ... Scout2 is an open source auditing tool that helps you keep your AWS environments secure. ... Scout2 AWS Audit Tool ... AWS security scans with Scout2
65%
Secure passwordless logins with FIDO2 and LDAP
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Recently, FIDO2 and the passwordless authentication that goes with it have been in focus. As long as you base your login on a flexible database system, you can simply add the required fields for one ... Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication. ... Store FIDO2 info in LDAP ... Secure passwordless logins with FIDO2 and LDAP
65%
The new version of Chef Automate comes with many new features
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Rock'n Roll Monkey on Unsplash
of Automate and InSpec forces developers to comply with applicable rules. If they do not follow the rules, no application is created in the first place. Prebuilt Tests If you combine Chef Automate 2.0 and In ... Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0. ... Chef Automate 2.0
63%
Clusters with Windows Server 2012 R2
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Jakub Gojda, 123RF.com
Windows Server 2012 rolled out a new, easier way to build a high-availability cluster. And, with Windows Server 2012 R2, you can even build the cluster with virtual servers and use virtual disks ... Clusters with Windows Server 2012 R2
58%
Cluster-Aware Updating for Windows Server 2012 R2
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © bahri altay, 123RF.com
the pitfalls. You can only use CAU in clusters that are running Windows Server 2012 or 2012 R2. Windows Server 2008 R2 does not support this function. CAU works with all applications running on clusters ... Cluster-Aware Updating for Windows Server 2012 R2
58%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
at once (Figure 2). Conversely, the previously mentioned rule with the eight CSS files now no longer applies. On the contrary, applying this rule slows down the website unnecessarily, because the maximum ... HTTP/2 introduced multiplexing, resulting in superior bandwidth utilization over HTTP/1.1, and HTTP/3 solves the problem of transmission delays from packet loss by replacing TCP with QUIC. ... HTTP/1.1 versus HTTP/2 and HTTP/3
57%
Monitoring with System Center 2012 R2 Operations Manager
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © dotshock, 123RF.com
(Figure 2). By right-clicking on the item, you can open the Alert View , State View , and Performance View via the context menu, or configure Overrides Summary View to disable rules for the object ... Monitoring with System Center 2012 R2 Operations Manager
54%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
the feeling when you have added a filter rule to your ruleset and realize afterward that it does not serve the intended purpose. Iptables as a packet filter is still the tool of choice on Linux systems. However ... Tune the iptables configuration for Docker by establishing your own forwarding rules.
52%
Getting Ready for the New Ceph Object Store
19.05.2016
Home »  HPC  »  Articles  » 
The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just released Ceph v10.2.x, Jewel. ... : For CephFS to work, the cluster needs MONs and OSDs, plus a MDS. They developers beefed up the server in Ceph v10.2.0 (Jewel). Under the hood, access to Ceph storage via CephFS works almost identically ... The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just released Ceph v10.2.x, Jewel.

« Previous 1 2 3 4 5 6 7 8 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice