Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 146 Next »

24%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
then shows the categories used by the devices, such as Cloud, Chat, and Web. Alerts As mentioned earlier, ntopng can generate alerts for certain events and for cases when thresholds are exceeded
24%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
_ADDR='http://127.0.0.1:8200' The unseal key and root token are displayed below in case you want to seal/unseal the Vault or re-authenticate. Unseal Key: PrAbjZWj2NYYnV6Lh/FRpf5Nu5f2E5fwZZf95JQiLdo= Root Token: s
24%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
. To make this solution future-proof, I left gaps between file names in case I have to add other files later that need to be launched at a specific stage. Setting up the Jenkins host URL though JCas
24%
High-performance Python – compiled code and C interface
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Konrad Bak, 123RF.com
_modules=cythonize("helloworld.pyx") ) The first two lines are fairly standard for a Python setup.py file. After that, the setup command builds the binary (shared object). In this case, the command is to cythonize the helloworld.pyx file. To make
24%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
both the registry and auth server behind a proxy like Apache, Nginx, or HAProxy. In this case, the port number is omitted from the registry URLs, and you have to avoid two open ports on the server
24%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
to the respective system. Although this sounds quite complicated in theory, it is simple in practice, as a basic example shows: Suppose FAI is being used on a company's workstations and servers. In this case, FAI
24%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
the video directly, which is a visual recording of two terminals. The first step pulls down a public image (from the Docker Hub registry in this case) and saves the container image to your filesystem. I
24%
GitLab for DevOps teams
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © maroti, 123RF.com
that come directly out of the application. For this use case, GitLab delivers an agent in deployment that integrates into the application and implements the scans. Technically, this is done by Git
24%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
, because the run time detects that the changes already exist. In the case of an embedded PowerShell resource, this contextual information is missing. Chef gets around this problem by introducing "guards
24%
Tools that extend Bash scripting
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Laschon Maximilian, 123RF.com
, system administrators can use them to track down problems. One of the most obvious use cases for logger is to have production scripts enter information into the system log. For example, it could be part

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice