Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1126)
  • News (395)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 183 Next »

18%
Can Your Server Be Toppled with a Single Command?
01.10.2011
Home »  Articles  » 
 
limiting TCP/IP connections, most of which are of the new variety. That won't work for us because our poor, old Apache server actively tries to keep the connections to the visitor's browsers open so
18%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
://blog.schlomo.schapiro.org/2014/03/opening-window-to-wider-world.html DDC: http://en.wikipedia.org/wiki/Display_Data_Channel Debian on RandR: https://wiki.debian.org/XStrikeForce/HowToRandR12 RandR project: http
18%
Run Kubernetes in a container with Kind
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
into setting up multinode clusters and opening host machine network ports so the cluster will allow applications to be accessed from outside of Docker. Additionally, you'll find a section in the documentation
18%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
from the forward state to the blocking state or vice versa, the paths between switches can be closed or opened. Decisions about which paths to open or close are made using the Spanning Tree Algorithm
18%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
Hat generally assumes that you will roll out PAD as a component in OpenShift, although this scenario is not enforced. However, if you want to use PAD, you will need an environment comprising Prometheus
18%
Manage updates and configuration with Azure Automation
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © bagwold, 123RF.com
to distribute patches with Azure Automation. More Convenient Updating with Azure Automation Azure Automation offers significantly more convenience when it comes to update management. If you open Azure
18%
Test mechanisms for best practices in cloud design
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Zlatko_Guzmic, 123RF.com
by the desire to provide data points for an external audit. You need to put a great deal of effort into creating an environment of trust, wherein problems can be addressed openly, despite it being a potentially
18%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
, as opposed to what theory predicts. The OpenSSL project incorporates two useful benchmarks: openssl speed [6], which tests cryptographic performance in abstract on the local machine without any network access
18%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
virtual or physical. Dashboard Back on the Landscape front end, the dashboard shows you that new computers have been registered and are waiting for authorization (Figure 1). Open the list of newly
18%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
security components, such as Intrusion Detection Systems (IDSs), are centrally collated, correlated, and holistically evaluated. SIEM systems specialize in performing this task, and several open source

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice