Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (975)
  • Article (311)
  • News (194)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Next »

13%
Acorn facilitates the deployment of apps in Kubernetes
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Önder Örtel on Unsplash
registry, label with a unique identifier (e.g., lm-test), and tag with a valid version number (e.g., v0.1). Once the push completes, the image can be launched and used in any Kubernetes cluster
13%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
possible tool to run a few VMs with a functional API, antMan is the right choice. Infos edgeLinux: https://antsle.com/products/antmanedgelinux/download/#0
13%
Manage guest accounts in Azure Active Directory
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jon Tyson on Unsplash
can ask Azure AD and its OpenID Connect configuration endpoint for help. The standard requires metadata for the domains, so if you type https://login.microsoftonline.com/domain.com/v2.0/.well
13%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
downstream (e.g., in Excel). Advanced View 2.0 Like the standard Users and Computers console (dsa.msc), you can also use the various NetTools functions to display object properties. You are probably aware
13%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
migration. Generally, IPsec is the best choice for these networks. For communication with file shares, it is best to use SMB 3.0 with end-to-end encryption to prevent man-in-the-middle attacks. If you use
13%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
to be a native Kubernetes resource and, like the other resources in Kubernetes, be manageable through its APIs. Even before the release of a formal version 1.0, the developers achieved this goal, and Traefik
13%
Keeping it simple – the Ansible automator
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Komkrit Suwanwela, 123RF.com
to the period between two major releases. The current major release of Ansible at the time of going to press was 2.10, but by the time this issue is published, version 3.0 will have probably seen the light of day
13%
New container solutions for Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Scott Griessel, 123RF.com
, libcontainer . This was not part of the solution right from the start; up until version 0.9, Docker drew directly on LXC to start and manage containers. However, LXC lacked several features, so Docker decided
13%
Enterprise job scheduling with schedulix
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © homestudio, 123RF.com
states is a mandatory requirement. If you do not do this yourself, you will get classical Unix mapping, which is the default in schedulix (i.e., an exit code of 0 for success and all other codes evaluated
13%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
in the location area (e.g., smb://192.168.0.11 ). You'll be prompted for an admin username and password before you can access the folders, unless of course, you marked them as public when adding them. After

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice