Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (241)
  • Article (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Next »

24%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
version of Vyatta, most notably VyOS [3]. The fork was successful, because VyOS includes all the DMVPN components: dynamic routing with high availability on top. EdgeOS Another player in the Vyatta market
24%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
be found on the Ansible website for the interested reader. Figure 3: The Ansible top-level directory tree. An Ansible deployment is organized
24%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
. Columns 1 to 5 could be used for statement labels (Listing 1; note that the first and last three lines are not code, but guides to show how code aligns in columns). Listing 1 Sample Fortran 77
24%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
RSA-based cipher modes in December 2017, researchers identified vulnerable implementations from at least seven vendors, including F5, Citrix, and Cisco, and 27 affected domains among the Alexa top 100
24%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
top 10, top 20, or even top 30 lists of the best root apps. We gained a positive impression of tools such as Android Tuner, Cron Tasker, Adblock Plus, zAnti, or the WiFi inspection tool and PCAP sniffer
24%
Chef users faced with a license change might find solace in a new open source distribution, Cinc.
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Pascal Bernardon on Unsplash
bugs if every system administrator is working with self-compiled binaries. On top of that, software vendors can ensure that the packages used by users meet certain quality standards
24%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
. The preceding file would thus lead to generic tasks that are not assigned to a specific group running on all three hosts. You could also use precisely this file combine server groups for DebOps, which simplifies
24%
Designate provides DNS as a Service in OpenStack
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Gabriele Maccaroni, 123RF.com
this option drops out. Although it might be of secondary importance for HTTP and HTTPS that a PTR record is missing, anyone wanting to send email from their systems will quickly stumble: Many email servers do
24%
Containers made simple
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Nathan Cima on Unsplash
on the horizon with Portainer. Of course, the solution's well-structured interface makes it easy to stay on top. No Direct Access As already described, Portainer Agent comes in two forms: the original form
24%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
here. The strategy can also be applied to containers (Figure 2). Figure 2: A buffer zone secures the containers. In the three following approaches

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice