Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 164 165 166 167 168 169 170 171 172 173 174 175 176 177 ... 201 Next »

17%
MariaDB MaxScale: A smart proxy for MySQL
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
]. The manufacturer also distributes the product as open source software; the entire source code of MaxScale is available from GitHub [4]. The open source version has all of the existing features, so an enterprise
17%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
a setting with a keyword and the desired setting separated by a colon and equals sign (Figure 4). AFICK ignores all lines that start with a hash (#) sign, so you should remove the # prefix if you want AFICK
17%
Transparent SIP communication with NAT
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © studiom1, 123RF.com
" – required a complete revision of the STUN concept on the basis of experience gained in practice. The new STUN (according to RFC 5389 [4]) is now just a mechanism used in conjunction with other specifications
17%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
to which the resource belongs and how long access is allowed according to the linked policy (Figure 4). Figure 4: The results of an access review campaign
17%
Windows Admin Center for managing servers and clients
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Dietmar Hoepfl, 123RF.com
the gear icon to access the settings. The Azure menu item lets you trigger the process by selecting Register (Figure 4). A code appears on the right-hand side, which you will need for registration. Copy
17%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
. The problem: It also installs the Ferm (For Easy Rulemaking, [4]) and TCP Wrapper tools. These tools nail down the host via iptables , so that it is no longer possible to login remotely. Ansible thus locks
17%
Storage Spaces Direct with different storage media
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Twwx, photocase.com
, the function can be activated in PowerShell: Enable-ClusterStorageSpacesDirect As part of the setup, you can enter > Test-Cluster -Node 4> -Include "Storage Spaces Direct
17%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
. Figure 4: Directory tree containing the jenkins_master role files. An example of the Ansible directory tree structure for the jenkins_master role is shown in Figure 4. Under this role, a tasks
17%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
the memory content, which could destroy valuable clues. The approach of cooling the memory and reading it out in a special device [4] is not practicable outside a laboratory environment. If the computer has
17%
Simplify integration of S3 storage with local resources
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Christopher Burns on Unsplash
the Storage Gateway on the basis of an EC2 instance, you need at least one general-purpose instance (m3 or m4) of the size "xlarge." The gateway performs better with instance types i2, d2, c3, c4, or r3

« Previous 1 ... 164 165 166 167 168 169 170 171 172 173 174 175 176 177 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice