Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (225)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 163 164 165 166 167 168 169 170 171 172 173 174 175 176 ... 215 Next »

18%
The 10 best tricks for taming Ansible
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © neoleo3d, 123RF.com
in their specific variables. Tip 3: Logging Ansible comes with a default logger for the command line. Although it basically works well, it is sometimes a bit chatty. Especially after running many Ansible statements
18%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
or small businesses can use the package for free, but larger organizations need to purchase a license [3]. The commercial license also includes special features such as the Hardened Docker Desktop, which
18%
Containers made simple
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Nathan Cima on Unsplash
. Figure 2: AKS is the only Kubernetes service by hyperscalers that Portainer supports out of the box. © Microsoft Alternatively, Portainer also supports Nomad (Figure 3), a tool for automatic
18%
Six new security features for  Windows Server 2022
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
proven the integrity of the UEFI beyond doubt but, instead, it relies on the additional Secure Launch procedure and on safeguarding the CPU's System Management Mode (SMM) [3]. Microsoft also refers
18%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Pad. For Android, you can use the Keepass2Android, KeePassDroid, KeePassMob, or KeepShare apps (Figure 3). It is worth testing the various apps because they offer different features, such as direct access to cloud
18%
Manage guest accounts in Azure Active Directory
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jon Tyson on Unsplash
in the usual way with Postman or Graph Explorer [2], which let you explore the API structure. A more detailed description by Microsoft of the cross-tenant access settings API is available online [3]. All
18%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Jack Hunter on Unsplash
GUI (WSLg) [3]. The basis for this is the WSLg system distribution based on CBL-Mariner (Figure 1), which runs Weston, the reference implementation of the server for the Wayland remote display protocol
18%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
policies can be assigned to the same security principal both directly and through policy silos (Figure 3). Policies from the silo always take precedence over the directly assigned policies
18%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
a Google product. The name of this program is Seesaw [3], which describes the core aspect of a load balancer quite well. Seesaw is based on the Linux virtual server (LVS) functions and therefore tends
18%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
Traefik Mesh [3]. Today, the vendor has two more products in its lineup: Traefik Pilot is a graphical dashboard that displays connections from Traefik Mesh and Traefik Proxy in a single application

« Previous 1 ... 163 164 165 166 167 168 169 170 171 172 173 174 175 176 ... 215 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice