Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 480 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (170)
  • Article (66)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 24 Next »

26%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
ns2 ip addr add 1.1.1.2/10 dev veth2 18 $ ip netns exec ns1 ip link set veth1 up 19 $ ip netns exec ns2 ip link set veth2 up 20 21 $ ip netns exec ns1 ping -c2 1.1.1.2 22 PING 1.1.1.2 (1.1.1.2) 56
26%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
the configuration file that I created, replacing the top stanza with my specific Apache logfile format. Listing 3 log_format in Config File # 68.XXX.XXX.XXX - - [22/Nov/2020:11:03:36 +0100] "GET /wp
26%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
Hetzner Announces S3-Compatible Object Storage Hosting and cloud provider Hetzner has announced Object Storage – a high-performance solution for storing unstructured data – which is suitable ... In the news: Hetzner Announces S3-Compatible Object Storage; Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure; OpenMP 6.0 Released; Open Source Development Improves
26%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
/inet/ike/config for the same partner would look something like Listing 4. Listing 4: /etc/inet/ike/config 02 p1_nonce_len 20 03 p1_xform { auth_method preshared oakley_group 2 auth_alg sha encr_alg 3des } 04 p2_pfs 2 05 { 06
26%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
:43 ubuntu22-vbox code[33011]: [2023-10-14 15:20:43] debug [tunnels::connections::ws] sent liveness ping Oct 14 15:20:43 ubuntu22-vbox code[33011]: [2023-10-14 15:20:43] debug [tunnels
26%
New features in MariaDB 10.3
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image by Adarsh Kummur on Unsplash
FOR NOT FOUND 18 RETURN count_students; 19 20 LOOP 21 FETCH GROUP NEXT ROW; 22 IF x THEN 23 SET count_students = count_students + 1; 24 END IF; 25 END LOOP; 26 END; 27 // 28 29 SQL> DELIMITER ; 30 31 SQL> SELECT ... What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now. ... MariaDB 10.3 ... New features in MariaDB 10.3
26%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
environment provides impressions of the insights Prometheus delivers into a Kubernetes installation. The Prometheus configuration is oriented on the official example [3]. When querying metrics from
26%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Configuration: [ 20 { 21 cidrMask: 24, 22 name: 'Web', 23 subnetType: ec2.SubnetType.Public, 24 }, 25 { 26 cidrMask: 24, 27 name: 'App', 28
26%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [3]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common
26%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
, just in case the device is left behind or lost. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice