Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1295)
  • Article (344)
  • News (221)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 162 163 164 165 166 167 168 169 170 171 172 173 174 175 ... 187 Next »

13%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
computer comprises a small circuit board with all the relevant components, which is exactly where the Foundries stack (Figure 3) comes in. Figure 3: Foundries
13%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
on one side and queries for existing data piling in from the query component on the other. Jaeger query, by the way, is the application that uses Jaeger's own user interface (UI; Figure 3) when it queries
13%
Managing Active Directory sites and subnets
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Allan Swart, 123RF.com
previously mentioned) but only by one DC at a time. This DC, known as the bridgehead server, automatically replicates with other bridgehead servers on other sites (Figure 3). At the respective site, the domain
13%
Certificate management with FreeIPA and Dogtag
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Oscar Sutton on Unsplash
the new server has joined the domain, you can create certificates for services on this machine and have them signed by the root CA on the Free IPA server (Figure 3). In this example, I run a web server
13%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
in the Teleport cluster at any given time and where the connection originated (Figure 3). The service then provides the information as a structured JSON file, which can be easily processed downstream in various
13%
Acorn facilitates the deployment of apps in Kubernetes
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Önder Örtel on Unsplash
by the need to have a normal Dockerfile that meets all formal requirements inside the working folder for the new Acorn image (Figure 3). The FROM directive specifies which base image (e.g., from Docker Hub
13%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
(Figure 3). At the beginning of a plugin, you need to import several Tsunami modules that can be used to run various tests with generic parameters. Functions such as outputting a report after it has been
13%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
to achieve a particular CMMC level as a condition of contract award. Building on the National Institute of Standards and Technology special publication (NIST SP) 800-171 (DoD Assessment Methodology) [3
13%
Alternative virtualization solutions when OpenStack is too much
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © elnur, 123RF.com
the name of its commercial variant, because oVirt is the open source foundation of Red Hat Enterprise Virtualization (RHEV; Figure 3). Figure 2: oVirt is Red
13%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
in the GUI with the use of drop-down lists (Figure 3). More than 280 predefined LDAP queries are found under Favorites , which is very useful. Besides illustrative material, you'll find a number of useful

« Previous 1 ... 162 163 164 165 166 167 168 169 170 171 172 173 174 175 ... 187 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice