Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 08 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (209)
  • Article (45)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 26 Next »

18%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
-passphrase Several parameters in this file define the repository layout [2] [3], as follows: Origin: An optional field that describes the origin of the repository. You can select a free line of text. Label
18%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
the central calendar and address book. Mobile devices needed Microsoft's ActiveSync protocol or (up to Kolab 3) the outdated SyncML to connect with the open source groupware. As of version 3.1, the Kolab team ... Open standards and open source are requisite in Kolab groupware. The alpha release of version 3.1 hugely extended the number of compatible clients with the CalDAV and CardDAV protocols, making Kolab
18%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
--region eu-west-1 05 --nodegroup-name chrisbinnie-eks-nodes 06 --node-type t3.medium 07 --nodes 2 08 --nodes-min 1 09 --nodes-max 2 10 --ssh-access 11 --ssh-public-key /root/eks-ssh.pub 12
18%
Life cycle management with Foreman and Puppet
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© auremar, 123RF.com
[3] runs on the client. Facter collects information about the system and forwards it to the Puppet master when Puppet runs. On the basis of collected facts, the master can generate a dynamic catalog
18%
Server administration using Cockpit
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexandr Marinenko, 123RF.com
). Figure 3: Cockpit 0.52 brings together all relevant information and functions on this overview page via the selected system, … Cockpit keeps a breadcrumb bar in the black bar at the top of the page
18%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
database remote:localhost/discworld root plocal 03 04 create class Person extends V; 05 create property Person.birthday date; 06 07 create class Book extends V; 08 create property Book
18%
Safeguard and scale containers
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © cepixx, 123RF.com
back to sleep. Listing 2 nginx_repl.yaml 01 apiVersion: v1 02 kind: ReplicationController 03 metadata: 04 name: nginx 05 spec: 06 replicas: 3 07 selector: 08 app: nginx 09
18%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
runtime is surrounded by confusion and ambiguity. The CRI-O runtime [3] is an Open Container Initiative (OCI)-compliant container runtime. Both runC and Kata Containers are currently supported
18%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
at the blog [3] reveals that new versions of Cockpit are released approximately every two weeks. In an article from 2015 [4], ADMIN looked into the topic of managing Linux servers with Cockpit; since then
18%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database. Figure 1: An image scan with Trivy generates a long list of vulnerabilities

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice