Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 58 Next »

32%
Package applications in Docker containers
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Jonathan Sanchez on Unsplash
with the sudo apt install command, and the applications are then available in the main menu. Docker Makes It Possible The decision in favor of Docker does not rule out other container formats in the future
32%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
is shown in Listing 2. Listing 1: Docker Specfile FROM nvidia/cuda:9.0-devel AS devel   # OpenMPI version 3.0.0 RUN apt-get update -y && \     apt-get install -y --no-install-recommends \         file
32%
Windows Server 2016 for small servers
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © blas, Fotolia.com
Windows Server 2012 R2 introduced the option of installing the Essentials functions as a server service on the Datacenter and Standard editions. Client Access Licenses (CALs) are not necessary when using
32%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
Diagnostic settings under the Monitoring section (Figures 2 and 3). Here, you add a new diagnostic setting, name it, choose the logs and metrics you want to collect, and specify the Log Analytics workspace
32%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
representative) survey at this year's Chemnitz Linux Days. Anyone in possession of a FIDO2 stick [2] can use it for SSH authentication – provided SSH, at least version 8.2p1 or preferably version 8.3, is available
32%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
on the operating system side, ranging from shorter timeouts, more restrictive firewall rules, and general recommendations for software and libraries, to specific kernel settings. Rather than standardized guidelines
32%
Enterprise resource planning and customer relationship management with open source
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © ximagination, fotolia.com
). OFBiz cooperates with, among others, MySQL, PostgreSQL, Oracle, Sybase, MS SQL Server, and IBM DB2. The OFBiz distribution includes Apache Derby, an open source Java database that runs on IBM Cloudscape
32%
Certificate management with FreeIPA and Dogtag
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Oscar Sutton on Unsplash
by it are identified as valid. Dogtag [1], the open source certificate system, offers a simple approach to managing an internal CA, and it integrates seamlessly with the FreeIPA [2] user directory. FreeIPA is to Linux
32%
Ticket Management with osTicket
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Ignard ten Have, 123RF.com
), for which you will need PHP Manager [2]. If these conditions are met, you can begin the installation by unzipping the archive and copying the folder data from the Upload folder into a directory (e
32%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
systems. Firewalls that have an IPv4 ruleset but do not apply the same rules for IPv6 traffic. The specific problem is detecting and blocking tunneled traffic. NIDS and firewalls that may be incapable

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice