Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1595)
  • Article (348)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 216 Next »

18%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
: 3 selector: matchLabels: app: my-app template: metadata: labels: app: my-app spec: containers: - name: my-app image: my-org/my-app:1
18%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
] Group policy settings for Windows Server 2022 [3] Windows Server 2022 comes with 47 new policy settings, for a total of 4,442 policies. More key data include: 39 new policies for the computer
18%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
, are quite moderate: All server systems as of Windows Server 2008 are supported. AADSync only needs .NET Framework Version 4.5 and PowerShell 3. Installation in Four Steps The installation comprises four
18%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
in a business-friendly manner and Max Schrems [3] having to remind the European Court of Justice (CJEU) of the applicable law. Here, too, the remedy is a lengthy process because an entire ecosystem is built
18%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
to CloudFlare CEO Matthew Prince, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS
18%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
and Windows Server 8 use the new PowerShell 3.0 that I’ll cover in a later entry. Starting and Stopping Services One of the basic duties of an Administrator is to start, stop, and restart services on systems
18%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
. It is used by all the parties (i.e., the mobile node, correspondent node, and home agent) in messages that have to do with the management and updating of bindings. Figure 3 shows the configuration
18%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
. One of the standard applications that relies on the REST API is Floodlight’s own GUI (Figure 3). Additionally, a Python-based Circuit Pusher automatically installs persistent OpenFlow rules
18%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
-friendly statistics that might be more suited to the less technical minded. Figure 3 shows MRTG Total Traffic Generator with some slightly modified output. Although it hasn’t been maintained since 2002, with only some
18%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
 , offers a test page where you can test your dual-stack connectivity (Figure 3). Figure 3: The Dual Stack Connectivity Chart offered by RIPE NCC [1] tells you

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice