Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (475)
  • Article (139)
  • News (41)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 67 Next »

44%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
in detail at the command line. Automatically, you can ensure, among other things, that a container actually contains MySQL and not bananas. Compact Friend CST currently supports four different test types
44%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
to roles and authorizations can have unwanted side effects, it makes sense to experiment with the intended settings in a trial set up. Using the Right Data Sources Connecting the actual SIEM data sources
44%
Jelastic: Java and PHP as a service
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Melinda Nagy, 123RF.com
. As operations then begin, the math becomes more complex, although the dashboard helps you understand how the costs are accruing. The promise to bill resources exclusively on the basis of actual usage is, in part
44%
Privileged Identity Management in Azure AD
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © lassedesignen, 123RF.com
the roles that they actually need for the current activity are unlocked for them. The other roles retain their "authorized" status but are not permitted until explicitly activated (Figure 1
44%
Data center networking with OpenSwitch
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © higyou, 123RF.com
the Way for Automation The configuration of a single switch is only one piece of the puzzle, compared with the actual ambitions of the OpenSwitch project. The target is automation in larger configurations
44%
Discover ransomware with PowerShell
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Andrea Danti, 123RF.com
Compares stored checksums with the current actual values" 125 write-output " " 126 write-output " Start: powershell -file _noRansom.ps1 /parameter" 127 write-output " Exit: errorlevel 11
44%
Is Hadoop the new HPC?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Dzmitry Sukhavarau, 123RF
. Most HPC applications are written in Fortran, C, or C++, with the aid of MPI libraries, as well as CUDA-based applications and those optimized for Intel Phi. The responsibility of the users is actually
44%
Exploring the AlmaLinux Build System
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © stylephotographs, 123RF.com
– an encryption utility that provides signing services for package verification Git – a source code repository system Git isn't actually part of the build system itself, but it is an integral part
44%
Migrating CentOS to Rocky Linux with migrate2rocky
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Ray Hennessy on Unsplash
Red Hat's announced re-envisioning of the popular CentOS Linux distribution [1] caused a major disruption in the Linux space. According to some surveys [2], CentOS was actually the third most
44%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
with a run script in the source code tree: ./run builder/virt-builder --list The output is shown in Figure 1. Unfortunately, however, you can’t actually build an image at this point, because you still need

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice