Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1592)
  • Article (347)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 182 183 184 185 186 187 188 189 190 191 192 193 194 195 ... 215 Next »

18%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
is the community open source version of the project, and Alien Vault Unified Security Management (USM) [3] offers even more in the way of features, scalability, and support. Additionally, it is worth noting that all
18%
News for Admins
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
 
, and boot mode. The Turing Pi is capable of running Kubernetes and Docker Swarm, can be used as a home server or for cloud-native apps hosting, and can host K8S, K3S, Minecraft, Plex, Owncloud, Nextcloud
18%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
is spawned from the source AMI (i.e., the official region-specific Ubuntu AMI ID). A micro-instance (by default) spins up from the AMI. 3 A snapshot of that instance is created, which gets
18%
Malware analysis in the sandbox
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Rostislav Zatonskiy, 123RF.com
dynamically without first setting up a Cuckoo environment, then online services, such as malwr.com, hosted by the Shadowserver Foundation [3], are recommended. Upload the file in question, and shortly afterward
18%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
developed two specifications that define the exact tasks of the container runtime [2] and the format of the container images [3]. The OCI specifications therefore ensure which tasks the runtime must perform
18%
A REST API automation strategy for DevOps
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image by Alex Kotliarskyi on Unsplash
EMC, and VMware systems also provide granular quality of service management to prioritize application requirements. Other providers in this area are Nutanix Prism, Pivot3 Acuity, Tintri, and HPE Synergy
18%
Drush vs. Drupal Console
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © iofoto, fotolia.com
management system (CMS) that powers some of your favorite websites. Drush [2] and Drupal Console [3] are both command-line tools that interact with an existing Drupal installation or help you get one up
18%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
to the server using an HTTP request. The malicious functions in MWI contain numerous prominent malware variants according to the results published by Sophos. Including: 1. Zbot 2. Carberp 3. Buhtrap 4. Hawk
18%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
to solve this dilemma. Compliance Undermined The US Department of Defense (DOD) Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) [3] also stipulate
18%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
already been received with great interest. The ownCloud Infinite Scale developers are planning to integrate Authelia into their groupware as an OpenID Connect provider [3]. Ruleset Imagine you want a team

« Previous 1 ... 182 183 184 185 186 187 188 189 190 191 192 193 194 195 ... 215 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice