Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1124)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 157 Next »

14%
10 Ways to Use Event-Driven Ansible
09.03.2023
Home »  News  » 
 
describes 10 ways you can apply Event-Driven Ansible for tasks related to networking, DevOps, and more, including: User request management Security automation Installation and provisioning
14%
How to Check Resource Usage of Your Kubernetes Pod
07.04.2023
Home »  News  » 
 
of a Kubernetes pod on a Linux system, including how to execute commands to see resource usage and how to install and use metrics tools. Read more at LinuxConfig.        
14%
Most Devices Remain Unpatched Against FortiGate Vulnerability
07.07.2023
Home »  News  » 
 
-27997 is a remote code execution in FortiGate VPNs, which are included in the company’s firewalls, Goodin says. And, although Fortinet released updates patching the flaw on June 8, many admins have yet to install
14%
Package applications in Docker containers
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Jonathan Sanchez on Unsplash
you to install multiple versions of a program simultaneously. Sandboxing as a security feature can play a role, or isolating apps so that they do not interfere with other programs. Additionally
14%
On the CD
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
software and a special installation tool called dcpromo that helps you set up the Samba system as an Active Directory domain controller.   Installation and Configuration The following excerpt
14%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
, the installation and configuration of individual tools is often time-consuming and complicated. The Kali Linux distribution specializes in testing and security solutions to take this work off your hands: It provides
14%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
A functional SCO environment comprises numerous components that can be installed together on a single system or distributed across multiple computers: Management server Orchestrator web service
14%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
-builder tool, which greatly accelerates the installation of new VM images. Otherwise, this can be a rather lengthy process that includes performing a normal installation of a Linux distribution. Lightning VMs
14%
Listing 1
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
Listing 1: Output of Installing numactl into VNFS [root@test1 ~]# yum --tolerant --installroot /var/chroots/sl6.2 -y install numactl Loaded plugins: fastestmirror, refresh-packagekit, security
14%
PowerShell OSDBuilder module
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Shubham Dhage on Unsplash
Many system administrators use images to provide customized Windows installations that comply with company policies and requirements, so images of Windows are an important tool to help them keep

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 157 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice