Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 159 160 161 162 163 164 165 166 167 168 169 170 171 172 ... 184 Next »

13%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
in the Teleport cluster at any given time and where the connection originated (Figure 3). The service then provides the information as a structured JSON file, which can be easily processed downstream in various
13%
Acorn facilitates the deployment of apps in Kubernetes
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Önder Örtel on Unsplash
by the need to have a normal Dockerfile that meets all formal requirements inside the working folder for the new Acorn image (Figure 3). The FROM directive specifies which base image (e.g., from Docker Hub
13%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
(Figure 3). At the beginning of a plugin, you need to import several Tsunami modules that can be used to run various tests with generic parameters. Functions such as outputting a report after it has been
13%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
to achieve a particular CMMC level as a condition of contract award. Building on the National Institute of Standards and Technology special publication (NIST SP) 800-171 (DoD Assessment Methodology) [3
13%
Alternative virtualization solutions when OpenStack is too much
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © elnur, 123RF.com
the name of its commercial variant, because oVirt is the open source foundation of Red Hat Enterprise Virtualization (RHEV; Figure 3). Figure 2: oVirt is Red
13%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
in the GUI with the use of drop-down lists (Figure 3). More than 280 predefined LDAP queries are found under Favorites , which is very useful. Besides illustrative material, you'll find a number of useful
13%
The state of OpenStack in 2022
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by vadim kaipov on Unsplash
languages and theming in a far better way. Canonical and Red Hat placed great emphasis on this dashboard: After all, Canonical Ubuntu wants to impress in orange (Figure 3), whereas Red Hat OpenStack accents
13%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
might not have containers and instead reside on bare metal. Physical hardware, for example, can easily be managed by open source software such as Foreman (Figure 3). As the administrator, you then have
13%
Package management tools for Windows
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
the organizational hurdles in the package review and release process with his AppGet project [3]. In early 2020, Microsoft expressed its intention to acquire the author's business and product, but they decided against
13%
Setting up Google Apps for Work
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Galina Peshkova, 123RF.com
the further use of email clients such as Outlook so that users don't have to change their usual office environment (Figure 3). Figure 3: You can continue to use

« Previous 1 ... 159 160 161 162 163 164 165 166 167 168 169 170 171 172 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice