Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 200 Next »

12%
Six new security features for  Windows Server 2022
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
, provided the hardware and virtualization are ready for them. Secure Boot Explained Security starts as early as the BIOS, or more likely in a state-of-the-art Unified Extensible Firmware Interface (UEFI
12%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
in. Because the solution is constantly evolving – with custom resource definitions, providers, and replica sets – even many die-hard admins of the early days of K8s have lost track of what's what
12%
Samba domain controller in a heterogeneous environment
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Zachary Nelson on Unsplash
. FreeIPA lacks some features needed to act as a DC that a Windows system provides over the Server Message Block (SMB) and Common Internet File System (CIFS) protocols. Version 4 of the well-known open
12%
Grafana and Prometheus customized dashboards
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Wynand van Poortvliet on unsplash
Visualizing data trends and issues when they arise is clearly of significant benefit, whether for applications or the systems on which they run. Having access to sophisticated tools that can provide
12%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
.argv[0], qos=0, retain=False) The user now receives information as soon as the client terminates (with Ctrl+C). The project mqttwarn [4] provides a Python tool with many plugins for such monitoring
12%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
for automation are not password protected. In this article, I provide a detailed set of instructions for how to counteract these weak points using the following simple restrictions: Create a separate key pair
12%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
are known as pico processes [2], which run in user mode, forming the shell for unmodified executable Linux applications. To do this, they forward their system calls to the pico provider drivers lxss
12%
Windows Admin Center for managing servers and clients
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Dietmar Hoepfl, 123RF.com
and synchronized with local machines. Continuous Improvements Microsoft extends WAC's capabilities by providing a new version every six months. New versions are quickly integrated, because only the Microsoft
12%
Automated compliance testing with InSpec
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Gunnar Pippel, 123RF
rules often provide for exceptions, but they do need to be replaced by the right solutions looking forward. InSpec, from the developer of Chef, promises to run compliance tests automatically
12%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
a compromise between the ability to synchronize secrets and secure storage. However, it would be best to use a method that provides a synchronizable and sharable, but nevertheless encrypted, storage space. Each

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice