Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1271)
  • News (421)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 168 169 170 171 172 173 174 175 176 177 178 179 180 181 ... 201 Next »

12%
Modularize websites with Web Components
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Prokhorov, fotolia.com
. The shadow DOM reduces conflicts with the rest of the document and provides interfaces for programming and formatting. Use of the design pattern is cultivated by Google's Polymer open source framework, which
12%
Managing Office 365 in PowerShell
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © sellingpix, 123RF.com
. Figure 4: Displaying the available commands for Microsoft Online Backup in PowerShell. Conclusions Microsoft's PowerShell provides a powerful shell with many options for managing local servers
12%
Programming with Node.js and JavaScript
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise 123rf.com
the end of the header and body, which is provided by the write function. In this case, end does everything in one fell swoop if you pass in the payload data to it. Listing 1 Simple Web Server
12%
IPv6 Tables
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © gepard1979, 123RF.com
IPv6 does away with NAT, which functions much like a firewall for internal networks with IPv4, even though it was not designed for that purpose. With IPv6, a dedicated firewall now needs to provide
12%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
it was for a lab environment, it didn't have to support high availability (HA). Thankfully, the clever Vault provides what is called dev server mode for just that requirement. In this article, I deploy
12%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
, virtual machines (VMs), or even VMs hosted by a cloud provider. For Jenkins to be able to use a machine as a slave, the machine only needs to be equipped with SSH access and a Java 8 Runtime. The builds
12%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
leading to the servers that provide A records for domains like hanscees.com . DNSSEC was designed to protect against intrusion techniques that result in client systems receiving forged or manipulated DNS
12%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
can run containers without having superuser permissions. Believe me when I say that this provides a far higher degree of comfort when it comes to leaving containers running on a system – development
12%
Setting up MariaDB replication with the help of XtraBackup
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Kran Kanthawong, 123RF.com
disadvantages. For example, values provided by user-defined functions or stored procedures can differ from call to call. An example would be now(). If this statement is repeated on the slave, it must produce
12%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
itself provides detailed instructions for securing its directory service [1]. Inquisitive Intruders An attacker usually enters a network through a single endpoint, such as an insecure PC, server, router

« Previous 1 ... 168 169 170 171 172 173 174 175 176 177 178 179 180 181 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice