Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (969)
  • Article (306)
  • News (173)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 146 Next »

17%
Security issues when dealing with Docker images
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Kae Horng Mau, 123RF.com
source license (Apache 2.0) in an irregular series of versions every few months. In early 2017, version 1.13 saw the 13th release appear since version 1.0 was published in June 2014. In early March
17%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
the number of desired container machines to be created. The names of the created container machines are a combination of the cluster name, the machines name, and the count index starting from 0. The image
17%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
that can be deployed on both 4G and 5G technology. A 5G campus network is designed to meet special requirements (e.g., to allow Industry 4.0 [1] applications to communicate). The market for 5G campus
17%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
.4' 02 services: 03 keycloak: 04 container_name: keycloak 05 image: quay.io/keycloak/keycloak:17.0.1 06 ports: 07 - 8080:8080 08 environment: 09 - KEYCLOAK
17%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
because access tokens in the OAuth 2.0 standard are usually only valid for one hour, after which you need to obtain a new token, which involves an in-depth reappraisal of the access context. At the end
17%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
OS and Linux, use the binaries for your choice of OS. By default, the web interface can be accessed on https://127.0.0.1:3333/ . The username is admin , and the password is output on the console. Before you can
17%
Network virtualization with OpenDaylight
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
the remote controller at 127.0.0.1:6633 . In other words, the control plane is missing. Just to confirm this, try to ping host h3 from host h1. You will see a message telling you that the host is not reachable
17%
Mesos compute cluster for data centers
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Artisticco LLC, 123RF.com
. The current version is Mesos 0.21. Two years after the first release, the developers presented a far more advanced variant [3] at a 2011 Usenix conference. Twitter engineers had already been running Mesos
17%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
for Network Controller. Network Controller and PowerShell 5.0 Together with Network Controller, the new PowerShell 5.0 is finding its way into Windows Server vNext and Windows 10, providing options
17%
Handy Windows tools for sniffing network traffic
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Barna Tanko, 123RF.com
, the tool checks the first bytes of the data stream. If the bytes contain characters lower than 0x20 (excluding CR, LF, or Tab characters), the tool automatically shows the information in Hex mode; otherwise

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice