Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (998)
  • Article (293)
  • News (145)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 137 138 139 140 141 142 143 144 145 Next »

16%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
]). Figure 2: A vulnerable majority: Only a tiny number of sites surveyed in May 2018 (7.6%) support a 3,072-bit key exchange (image source: Qualys SSL Labs [2]). On discovering the ROBOT exploit against
16%
Windows 10 Updates with WSUS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © sensay, 123RF.com
Offline Update [6] freeware tool helps with this process (Figure 4). The tool automatically downloads the WSUS catalog file from Microsoft and then all the patches that you selected. You don't have
16%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
how long DHCP clients can keep their addresses. If your provider has assigned you an IPv6 subnet, your DHCP server can pass on addresses from this segment to your LAN systems, which is sometimes
16%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
engine, which is Elasticsearch in the ELK or in Elastic stack. Installing and configuring Logstash is covered in an article from Elastic [6]. Each client system runs a small tool named Filebeat
16%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
of which perform different tasks. A short overview can be found in the official documentation [6]. Getting Started The initial setup of CFEngine 3 took place with the bootstrapping section at the end
16%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
. The command $ systemd-analyze Startup finished in 1.026s (kernel) + 5.925s (userspace) = 6.952s shows you the slowest services to load when you boot up your system, so you can name and shame those services
16%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
finished in 1.026s (kernel) + 5.925s (userspace) = 6.952s shows you the slowest services to load when you boot up your system, so you can name and shame those services (and then fine tune them afterward
16%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
options are useful is to run tests, particularly with the applications you plan on running. Infos FS-Cache: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html
16%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
advanced configurations such as multiple network interfaces on a single VM, custom routing, and the use of both public and private IP addresses. Additionally, Azure's support for IPv6 and its API offerings
16%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
in Windows 10 from the German Federal Office for Information Security [5] Center for Internet Security benchmarks [6] US Department of Defense Security Technical Implementation Guide [7] Australian

« Previous 1 ... 137 138 139 140 141 142 143 144 145 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice