Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1329)
  • Article (336)
  • News (251)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 192 Next »

9%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
12.10 as a storage option for our OpenStack reference architecture … ." The Ceph open source distributed storage system combines object storage, block storage, and a Posix-compatible filesystem
9%
Run Kubernetes in a container with Kind
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
-Lo ./kind https://kind.sigs.k8s.io/dl/v0.10.0/kind-linux-amd64 $ chmod +x ./kind $ mv ./kind /usr/local/bin/kind $ kind --version kind version 0.10.0 Get an incredibly quick start
9%
Importing SSH keys on AWS
05.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
see the newly uploaded keypair: ec2-describe-keypairs KEYPAIR dan-key fc:39:b2:60:90:4c:0f:66:fc:b8:a6:54:af:19:0c:ef KEYPAIR my-key a6:54:af:19:0c:ef:fc:39:0f:66:fc:b8:b2:60:90:4c KEYPAIR your
9%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
. CMMC in Depth CMMC is currently on its second iteration, CMMC 2.0. The prior iteration of CMMC was CMMC 1.0, which built a framework of four elements: security domains, capabilities, practices
9%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i kubeletctl pods --cidr 3.71.72.0/24 -i Figure 1: Scanning for nodes to see if they are vulnerable with an exposed kubelet
9%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
tool in IPRoute2 is ip. In many cases, additional options can be set for the show commands. For example, if you only want to output the IP configuration for eth0 , the short command is ip address
9%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
: The most important tool in IPRoute2 is ip. In many cases, additional options can be set for the show commands. For example, if you only want to output the IP configuration for eth0, the short command
9%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem
9%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem
9%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
are missing, potential causes include invisible SIP traffic, incorrect selection of the network interface, or missing permissions. Your first step is to check whether SIP traffic exists sudo tcpdump -i eth0

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 192 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice