Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e1000】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 162 163 164 165 166 167 168 169 170 171 172 173 174 175 ... 216 Next »

42%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
Google's Let's Encrypt. Certificate handling is usually very unpopular with admins, because running your own certificate management setup is tedious and time consuming. Even creating a certificate signing
42%
PostgreSQL 9.5 – What's new; what's better?
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Sergey Nivens, 123RF.com
PostgreSQL 9.5 contains more than 100 changes, including dozens of performance improvements. The first highlight in PostgreSQL 9.5 is the extension of the INSERT command to include the ON CONFLICT
42%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
-key parameter: duplicity --ssh-askpass --encrypt-key 12345678 /etc scp://dd@example.com//var/backup Normally, you need to type the passphrase after calling the command. If Duplicity runs directly, the GPG agent
42%
Legally compliant blockchain archiving
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Jade Masri on Unsplash
set up primarily to evaluate its content (e.g., as Google did) and use the knowledge gained in a meaningful way to optimize business processes. Typically, companies in the past stored quite large
42%
Monitoring and service discovery with Consul
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Joshua Earle on Unsplash
is a cluster service, of which an instance will ideally be running on every system in the setup, all information of the KV store is available at any time on all systems of the platform. Consul offers
42%
Simplify integration of S3 storage with local resources
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Christopher Burns on Unsplash
the Volume Gateway The Volume Gateway is basically an iSCSI target that creates volumes and assigns them to local servers (or EC2 instances) as iSCSI LUNs. The Volume Gateway can run in either cached
42%
Spam protection using SpamAssassin
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
protection needs to be updated continually if it is to provide protection. Ideally, the filter should be located in the enterprise at the central node through which incoming email traffic runs and where
42%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
databases. Figure 1 shows a comparison: Relational databases keep all data in tables, with a column for each attribute. The tables impose a rigid schema at run time, and additional attributes either require
42%
High availability with Oracle Standard Edition
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © aquir, 123RF.com
of transactions is on the low side, a standby solution where the redo log files are transmitted every five minutes might come into question. Be careful: This can quickly become a bottleneck in batch runs or other
42%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
. Installation and Configuration After you download the free edition of Burp Suite [1], simply double-click the .jar file to run the file. Once the application is running, click Proxy  | Options , and check

« Previous 1 ... 162 163 164 165 166 167 168 169 170 171 172 173 174 175 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice