Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1592)
  • Article (347)
  • News (226)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 ... 217 Next »

18%
Feeding Seagulls Is Wrong
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © aphaspirit and Brian Guest, 123RF.com
is complete. 3. Don't click on executables in email messages. 4. Don't Panic. 5. Never pay a ransom. I know that it's human nature to panic in the face of having your computer invaded by ransomware, but you
18%
Adding high availability to a Linux VoIP PBX
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © MIR, Fotolia.com
IP PBXs; in particular, I demonstrate how to cluster two Asterisk or FreeSWITCH PBXs with the community (free) edition of a popular PBX clustering product from Telium [3]. Designing Your Cluster Open
18%
Tools for automation in the cloud
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Cytonn Photography on Unsplash
. Besides two plugins that can be used to create an inventory from a list of existing Elastic Compute Cloud (EC2) instances and Simple Storage Service (S3) buckets, various Ansible modules also manipulate
18%
Terraform multicloud orchestrator version 1.0
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Annie Spratt on Unsplash
. These state files can be stored either locally or in a remote store (e.g., on Amazon's S3). The remote option has the advantage that Terraform can fetch the target state from the network at any time, which
18%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
Admin Center or directly by the compliance URL [3]. In Purview, a menu for the various services is on the left and is also where you will find the Data loss prevention section (Figure 1). Go
18%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
's website [1] and supply your email address to receive the link. The antMan package is about 3.1GB, and you should follow the normal steps to put the ISO file on a DVD or USB stick. Most servers today ship
18%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
on node 2, and container C on node 3, and make sure the container data sets are replicas (i.e., they match). Instead, the statement would read: Create three replicas of the same container. Kubernetes
18%
Databases in the Google Cloud
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jon Parry on Unsplash
the database in Frankfurt, Germany, for example, select europe-west3 as the region. If you want the database to be highly available, use the Multiple zones (Highly available) option under Zonal Availability
18%
Upheaval
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
a remote location, and (3) work hours outside of 8:00am to 5:00pm. I like to work remotely. I have fewer distractions at home, which I understand is not the case for everyone, but it works for me. I also don
18%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
of Windows on corporate networks. Well-known third-party providers are the Defense Information Systems Agency (DISA) [3] and the Center for Internet Security (CIS) [4]. In general, it is worthwhile to work

« Previous 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 ... 217 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice