Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1562)
  • News (445)
  • Article (316)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 191 192 193 194 195 196 197 198 199 200 201 202 203 204 ... 234 Next »

12%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
According to my relatively cursory inspection of the provided Docker containers, the first thing to note about Jenkins is that the version you use can be the difference between documentation immediately
12%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
of the label; you can display an overview of all labels and each immutableID with PowerShell: Get-Label | ft ImmutableID, Name The table output from the command provides the assignment of the IDs to the label
12%
Program GUIs in Go with Fyne
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Santoshi Guruju on Unsplash
, and the second is the hash function to be applied. The required algorithms for different hash functions are provided by the standard Go library in the crypto package. Compiling To compile the program, change
12%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
MachinePlatform If the container host is a virtual server provided by Hyper-V, for example, you will need to enable embedded virtualization for the host. Otherwise, WSL2 will not run, affecting container host operation heavily
12%
Kernel and driver development for the Linux kernel
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © psdesign1, Fotolia.com
on a hard disk; rather, the kernel creates them dynamically on access. The term "proc" derives from "processes"; thus, it is clear that the /proc filesystem primarily provides information about computing
12%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
, and one of the better ones is called htop [4]. Htop is a bit more interactive than Top, but it provides very similar information. The screenshot in Figure 7 is htop running on my desktop while running
12%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
Studio provides a library of more than 180 queries for different use cases (Figure  1). By default, these are stored in the program directory in the LPSV2Library.XML file. Additional user-defined queries
12%
Puppet Bolt orchestration tool
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by lee junda on Unsplash
, it provides monitoring functionality and checks at short intervals whether the services in question are still available or whether infrastructure elements have gone missing. Bolt basically zooms in on point
12%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
own, which makes everyday administrative work far easier. 2FA The vast majority of setups that rely on SSH do not provide support for a second factor. The classic setup with SSH keys only handles 2FA
12%
Manage projects in SMEs with OpenProject
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pedro Miranda on Unsplash
is largely dead in the water in smaller organizations. SMEs are usually not interesting enough for the large providers of agile training and certification because not enough revenue can be generated. Therefore

« Previous 1 ... 191 192 193 194 195 196 197 198 199 200 201 202 203 204 ... 234 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice