Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (870)
  • Article (89)
  • News (8)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 98 Next »

39%
Automating the Azure infrastructure using a command-line interface
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © nk88, photocase.com
-resgroup -n ita-server2016 -l westeurope -Q microsoftwindowsserver:WindowsServer:2016-Technical-Preview-with-Containers:2016.0.20151118 -y Windows -u klaus -p Passw0rd! No matter how you create a server
39%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
> at the command line as follows: nslookup dc02.microsoft.com dc01.contoso.com Here, nslookup attempts to resolve host dc02.microsoft.com using server dc01.contoso.com . Instead of the second entry, you could
39%
Symbolic mathematics with Python's SymPy library
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Buchachon Petthanya, 123RF.com
simplification of the hypotheses. Two of these cases, important for technical applications, are examined in this section. Consider a flat, homogeneous, infinite wall of constant thickness s (Figure 6) with faces
39%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
6. In the command line, the --password option specifies the passphrase as MY_SECRET . You also can use the -P option instead of --password. If you want to use a longer passphrase with blanks, enclose
39%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
/coreos/clair Docker Bench for Security: https://github.com/docker/docker-bench-security CIS Docker 1.6 benchmark: https://www.cisecurity.org/cis-benchmarks/ OpenSCAP: https://github.com/OpenSCAP/openscap Open
39%
News for Admins
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
 
Web Services (AWS). According to the announcement (https://ciq.com/blog/ciq-offers-lts-for-rocky-linux-8-6-8-8-and-9-2-images-on-aws/), this LTS "ensures extended life for discontinued major and minor
39%
iSCSI: Set up and use LIO targets
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Volodymyr Krasyuk, 123RF.com
service (Listing 2). Listing 2 Launch the Target Service # rpm -qa | egrep -e targetcli\|configshell\|rtslib python-rtslib-3.0.pre4.9~g6fd0bbf-1.noarch targetcli-3.0.pre4.3~g0fba804-1.noarch
39%
Configuration management and automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Valerijs Kostreckis, 123RF.com
package before installing: $ wget http://dl.bintray.com/rundeck/rundeck-deb/rundeck-2.6.7-1-GA.deb $ sudo dpkg -i rundeck-2.6.7-1-GA.deb Installing a package is practical because it integrates a Rundeck
39%
High-performance load balancing
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © meyrit, 123RF.com
. Setting Up Go Seesaw v2 is based on Go, so you must make sure that various Go packages are in place before the installation: golang.org/x/crypto/ssh github.com/dlintw/goconf github.com
39%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
of the stack in the Application Layer (OSI model Layer 7) [6]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice