Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1005)
  • Article (294)
  • News (153)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 138 139 140 141 142 143 144 145 146 Next »

16%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
outside the scope of backups. The length of a backup period is a business- and process-based decision and not a technology-driven decision. You can also see the deleted file in Table 6. Table 6: inode
16%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
-password If your private repository uses SSH keys for authentication, you can provide the SSH private key in the Secret instead of a username and password (Listing 6). The url field specifies the SSH URL
16%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
relaying party you still have to maintain is the one between ADFS and Azure AD (shown in Figure 6 as a light green connection). Figure 6: Azure Active
16%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
are documented in the .zip file format specification. Also, starting in version 6.2 of the ZIP format, file name encryption was introduced so that metadata was encrypted in what is called the “Central Directory
16%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
 Parallel-NetCDF that uses MPI-IO underneath. The initial goal was to focus on older formats: CDF-1, the “classic” format primarily used for netCDF through version 3.5, and CDF-2, added in CDF-1 version 3.6.0 onward, which
16%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
in logwatch.conf. If you want to include archived logfiles (e.g., messages.1.gz or syslog.6.gz) in addition to the logging directory, you use the following option (which is No by default): Archives = Yes
16%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
]). Figure 2: A vulnerable majority: Only a tiny number of sites surveyed in May 2018 (7.6%) support a 3,072-bit key exchange (image source: Qualys SSL Labs [2]). On discovering the ROBOT exploit against
16%
Windows 10 Updates with WSUS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © sensay, 123RF.com
Offline Update [6] freeware tool helps with this process (Figure 4). The tool automatically downloads the WSUS catalog file from Microsoft and then all the patches that you selected. You don't have
16%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
how long DHCP clients can keep their addresses. If your provider has assigned you an IPv6 subnet, your DHCP server can pass on addresses from this segment to your LAN systems, which is sometimes
16%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
engine, which is Elasticsearch in the ELK or in Elastic stack. Installing and configuring Logstash is covered in an article from Elastic [6]. Each client system runs a small tool named Filebeat

« Previous 1 ... 138 139 140 141 142 143 144 145 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice