Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1562)
  • News (445)
  • Article (316)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 194 195 196 197 198 199 200 201 202 203 204 205 206 207 ... 234 Next »

12%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
, virtual machines (VMs), or even VMs hosted by a cloud provider. For Jenkins to be able to use a machine as a slave, the machine only needs to be equipped with SSH access and a Java 8 Runtime. The builds
12%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
leading to the servers that provide A records for domains like hanscees.com . DNSSEC was designed to protect against intrusion techniques that result in client systems receiving forged or manipulated DNS
12%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
can run containers without having superuser permissions. Believe me when I say that this provides a far higher degree of comfort when it comes to leaving containers running on a system – development
12%
Setting up MariaDB replication with the help of XtraBackup
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Kran Kanthawong, 123RF.com
disadvantages. For example, values provided by user-defined functions or stored procedures can differ from call to call. An example would be now(). If this statement is repeated on the slave, it must produce
12%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
itself provides detailed instructions for securing its directory service [1]. Inquisitive Intruders An attacker usually enters a network through a single endpoint, such as an insecure PC, server, router
12%
Integrating scripts into Group Policy
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © abidal, 123rf.com
scripts: User Configuration | Policies | Windows Settings | Scripts . Processing scripts using group policies provides more flexibility. This also includes traditional logon scripts that you no longer
12%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
main memory for the CPU. After all, swapping out pages is bound to affect the processor. Figure 1: Performance monitoring provides very accurate insights
12%
Effective debugging of Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Stuart Monk, Fotolia.com
will help – provided they are included in the Docker image on which the container was built. If you build the containers yourself, you should pay attention to your basic configuration, because the Linux
12%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
outage. The longer the commit interval, the greater the risk of data loss. The use of RAM as a cache provides huge performance advantages for the user. Don't forget, however, that RAM is volatile
12%
Storage innovations in Windows Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liubomirt, 123RF.com
(FC SAN)/Internet Small Computer System Interface (iSCSI). This storage is then provided to the application servers, such as Hyper-V or SQL Server, over the network. SMB version 3 is used

« Previous 1 ... 194 195 196 197 198 199 200 201 202 203 204 205 206 207 ... 234 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice