Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1126)
  • News (395)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 145 146 147 148 149 150 151 152 153 154 155 156 157 158 ... 183 Next »

18%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
using the wizard to set up the ATA Center, you need to open a connection to the console via the web interface. To do this, enter the IP address or name of the Center in your web browser. After logging
18%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
as System Center Operations Manager 2012 R2/2016. The background to this technology is that management programs no longer individually access all the components of the network but open a connection
18%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
-oF offloading on its ConnectX network cards (Figure 5) if you use the vendor's OpenFabrics Enterprise Distribution (OFED) driver. The network card then takes care of NVMe-oF packets and can also make use
18%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
; instead, the focus is on starting all services needed for Talos operation (e.g., apid) and on guaranteeing the functionality of the Open Container Initiative (OCI)-compatible runtime environment
18%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
been available ever since in two flavors: a free open source version, which is completely under the GPLv3 license, and the commercial Eucalyptus Enterprise Edition, which supports the integration of SANs
18%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
remains open; otherwise, the runtime environment would terminate the container immediately. Next is building and launching the image: $ docker build . -t lm-example/nginx $ docker run -d -p 80:80 am
18%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
are just as varied. A classic attack scenario focuses on the local part of the organization. The attacker typically takes complete control of AD, ultimately to destroy it. This positioning also opens
18%
Network load balancing on Windows Server
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Nathan Cima on Unsplash
Network means all cluster nodes can open a connection to the client, and None drops the relationship. Check the settings and discover the best option for your requirements. Port rules also determine which
18%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
, and implement secure architectures. For threat modeling, you can use the Open Web Application Security Project (OWASP) threat modeling tool Threat Dragon [1]. DevSecOps Principles The key DevSecOps principles
18%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
active connections to all monitored servers open. In many places, administrators collect all logfiles in a centralized database anyway. To ensure that the log data is not only available to a single

« Previous 1 ... 145 146 147 148 149 150 151 152 153 154 155 156 157 158 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice