Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1444)
  • Article (117)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 168 Next »

37%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
as an access control system. The rules are stored in YAML format (Listing 1). The example is also based on the online documentation [4]. It allows all users from the hamburg group to access the wiki.example.com
37%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
 
the files to the user's desktop when the job is completed. For more information about these products, visit http://www.pbsworks.com/. Akamai Introduces
37%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
.microsoft.com/en-us/windows/wsl/compare-versions#whats-new-in-wsl-2 Pico processes: https://docs.microsoft.com/en-in/archive/blogs/wsl/pico-process-overview WSL 2 source code of the Linux kernel: https://github.com
37%
Cryptographic key access in the cloud
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © scanrail, 123RF.com
that access to the private GnuPG key also works from a remote computer. Here, however, you have to list explicitly the socket you want to forward in the ~/.ssh/config SSH configuration file: Host *.example.com
37%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
breach. Infos Introducing Stethoscope: https://netflixtechblog.com/introducing-netflix-stethoscope-5f3c392368e3 Jamf: https://www.jamf.com LANDESK: https
37%
A Bash-based monitoring tool
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © citalliance, 123RF.com
"Top Top-Like Tools" by Jeff Layton, ADMIN , issue 23, 2014: https://www.admin-magazine.com/HPC/Articles/Top-Top-Like-Tools htop: https://github.com/hishamhm/htop atop: https://github.com
37%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
of Footloose, move it to the system path, and make it executable (requires sudo privileges on GNU/Linux), enter: curl -sSLk "https://github.com/$(curl -sSLk https://github.com
37%
Run your own chat server
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Volodymyr Hryshchenko on unsplash
for an Internet domain (e.g., domain.com ) and create your users with names following the pattern @name:domain.com . Up to this point, everything looks be very simple and you seem to have yet another closed chat
37%
News for Admins
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
 
and developers, aimed at helping organizations accelerate IT automation. Ansible Lightspeed (https://www.redhat.com/en/technologies/management/ansible/ansible-lightspeed) "accepts prompts entered by a user
37%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
-performance computing, known as quantum-centric supercomputing." "In a quantum-centric supercomputing architecture," the announcement states (https://newsroom.ibm.com/2025-08-26-ibm-and

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 168 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice