Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1345)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 151 152 153 154 155 156 157 158 159 160 161 162 163 164 ... 200 Next »

8%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
_UC=https://updates.jenkins.io/stable-2.150/latest/ 27 ENV PLUGINS="jdk-tool script-security command-launcher configuration-as-code configuration-as-code-support configuration-as-code-groovy" 28 29 RUN curl -sSfL --connect-timeout 20
8%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
to Layer 2 protocols but are exchanged between hosts using the Border Gateway Protocol (BGP). Each switch functions as a BGP router and each host also speaks the BGP protocol. If horizontal scaling
8%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
need an option to log in to remote systems (see the "Immutable IT" box). Talos Linux occupies less than 90MB when installed, compared with Ubuntu, which hogs almost 2GB in a minimal installation (Figure
8%
OpenStack: Shooting star in the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Vladimir Nenov, 123RF.com
– often enough, customers will not have the knowledge necessary to install the virtual machine. The admin is naturally not interested in taking on the task manually. Glance [2] provides a solution
8%
Hands-on Exchange rights management
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Isaac Marzioli, 123RF.com
Management Console in Exchange Server 2013 or in the web-based management console, Exchange Admin Center. Management roles summarize the cmdlets used to manage Exchange components (Figure 2). Users who
8%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
.exe. Other tools used for this purpose are Royal TS [1] or the Microsoft Remote Desktop Connection Manager [2]. Enabling the Allow connections only from computers running Remote Desktop with Network Level
8%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © crazymedia, 123RF.com
complete for the time being; the next step is to prepare the local Hyper-V server. Setting Up a Local Agent Hyper-V Server can be used on Windows Server 2012 R2 or newer. All operating systems
8%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
not a popular approach, allowlisting and associated tools have been around since time immemorial: XP, Service Pack 2, software restriction policies (aka SAFER) Windows Vista, AppLocker (Enterprise, aka
8%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB
8%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
are: (1) shift security to the left, which implies that security and testing should be performed at the beginning of the SDLC process; (2) include software patches that are applied as soon

« Previous 1 ... 151 152 153 154 155 156 157 158 159 160 161 162 163 164 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice