Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1081)
  • Article (302)
  • News (160)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 155 Next »

9%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
that the build process always produces identical packages. This is not the case in general. Instead, two binaries built from the same source code may often differ for several reasons [6]. For example, the packets
9%
Landscape
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
the functionality, such as Puppet and Foreman [3] or Chef [4]. For Red Hat-based distributions, the free Spacewalk [5] tool, on which the commercial Satellite [6] is based, is also an option. Thus, Landscape
9%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
Manager (nsmd), running as a DaemonSet [6] on each node and linking the client pod with the VPN gateway in the example. Therefore, an NSM InitContainer must be running in the requesting client pod, as well
9%
Domain name resolution with DNS over HTTPS
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Sergejus Bertasius, 123RF.com
at the operating system level, you need to install a proxy. I use the cloudflared daemon for this, which is available in various package formats for different platforms and, of course, as source code [6]. The first
9%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
's not all. The network has evolved over time. The Internet Engineering Task Force (IETF) [6] makes sure this evolution happens in a controlled manner, developing a number of protocols to spice up simple
9%
Manage resources with AWS CloudFormation
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © krisckam, 123RF.com
Press_Single_Instance_With_RDS.template); click Next . 5. On the Specify Parameters page in the KeyName field, enter the name of a valid Amazon EC2 KeyPair from the same region in which you are creating the stack; click on Next . 6
9%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
Some people consider container systems like Docker [1] a new form of virtualization – a natural continuation of KVM [2], Xen [3], VMware [4], Hyper-V [5], and the Zones concept in Solaris [6
9%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
vulnerabilities that need to be addressed. (2) Osquery [5] is another host-based tool that queries and logs the system status. (3) Beats [6] uses Winlogbeat to monitor Windows-specific logs and files. Filebeat
9%
Setting up HTTP/2 on the Apache HTTP Server with PHP compatibility
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ave Calvar on Unsplash
. Disable the HTTP/2 module a2dismod http2  4. Disable the Proxy module a2dismod proxy  5. Disable FastCGI Proxy module a2dismod proxy_fcgi  6. Remove the PHP Fast
9%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
. Finally, mandatory internal and external requirements, such as the Sarbanes-Oxley Act (SOX) [5], PCI-DSS [6], ISO 27001 [7], and Basel II [8], ensure technical and organizational compliance. Ultimately

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice