Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 200 Next »

12%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
MachinePlatform If the container host is a virtual server provided by Hyper-V, for example, you will need to enable embedded virtualization for the host. Otherwise, WSL2 will not run, affecting container host operation heavily
12%
Kernel and driver development for the Linux kernel
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © psdesign1, Fotolia.com
on a hard disk; rather, the kernel creates them dynamically on access. The term "proc" derives from "processes"; thus, it is clear that the /proc filesystem primarily provides information about computing
12%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
, and one of the better ones is called htop [4]. Htop is a bit more interactive than Top, but it provides very similar information. The screenshot in Figure 7 is htop running on my desktop while running
12%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
Studio provides a library of more than 180 queries for different use cases (Figure  1). By default, these are stored in the program directory in the LPSV2Library.XML file. Additional user-defined queries
12%
Puppet Bolt orchestration tool
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by lee junda on Unsplash
, it provides monitoring functionality and checks at short intervals whether the services in question are still available or whether infrastructure elements have gone missing. Bolt basically zooms in on point
12%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
own, which makes everyday administrative work far easier. 2FA The vast majority of setups that rely on SSH do not provide support for a second factor. The classic setup with SSH keys only handles 2FA
12%
Manage projects in SMEs with OpenProject
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pedro Miranda on Unsplash
is largely dead in the water in smaller organizations. SMEs are usually not interesting enough for the large providers of agile training and certification because not enough revenue can be generated. Therefore
12%
Manage guest accounts in Azure Active Directory
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jon Tyson on Unsplash
/beta/$metadata#policies/crossTenantAccessPolicy/partners/$entity", "tenantId": "72f988bf-86f1-41af-91ab-2d7cd011db47", "isServiceProvider": null, "b2bCollaborationOutbound": null, "b2bCollaborationInbound": null, "b2bDirectConnectOutbound": null, "b2b
12%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
. The developers aimed to enable all these improvements without needing to adapt existing networks. Protocol Structure Connectionless UDP provides the basis of the QUIC protocol. Data is exchanged between
12%
Distributed MySQL with Vitess
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kheng Ho Toh, 123RF.com
that their providers will continually reduce the cost of IT infrastructure and its operation, today IT can only be operated efficiently if it relies on sheer mass. In the past, admins might have had a few dozen systems

« Previous 1 ... 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice