Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 160 Next »

38%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
communication, including communication to the bots, relies on HTTPS. The chat server itself can hide behind an SSL-terminating proxy, which means that a chat environment does not require a dedicated IP address ... Chat servers likely send confidential data to the cloud, so if you don't want to see your business talks on Google or Amazon, you can keep your information safely in your own data center with self
38%
PipeCD for CI/CD
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Kazuo ota on Unsplash
ArgoCD uses the Helm package manager. Helm is considered an absolute standard tool in the Kubernetes scene. In principle, it does the same thing for containers as RPM or DPKG do for Linux packages
38%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
on updating packages once a quarter. Although you are updating the host's software and the runtime environment for the containers (e.g., Podman or Docker), the software in the containers does not benefit
38%
Instant Gratification – The End of Server Admins?
28.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
like signing up for any other site. And that’s what Standing Cloud feels like to me. To get started, sign in with your Google, Yahoo, or Facebook ID, and you’re presented with a list of just over 102
38%
One Hacker Could Have Taken Control of Macs Used by IT Professionals
14.08.2018
Home »  News  » 
 
for securely connecting to computers on a network. Holmes  informed the Homebrew crew and they fixed it within a matter of hours. The moral is, just because it’s open source does not mean that it’s safe. Open
38%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
kind of block devices. Therefore, it does not matter whether the device to be encrypted is a hard disk, an LVM volume, or a USB stick. LUKS usually uses a 256-bit AES key that is protected
38%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
as possible autonomously. Only if it can't make any progress does it access the web server or the web application server behind it. Varnish cannot do anything that other elements in the chain (i.e., the web
38%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
], LANDESK [3], Google's G Suite Mobile Management [4], and bitFit [5]. Herd Immunity One of the most impressive aspects of Netflix's Stethoscope is that, when it displays its findings, it generously
38%
Call web pages in the terminal with Browsh
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © yemelyanov, 123RF.com
Script does not run correctly, and the computer prevents logging on to services on the network. Firefox Browsh uses a little trick when it displays websites: It starts Firefox in the background in headless
38%
Meet the CTO of Red Hat
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo courtesy of Swapnil Bhartiya
it, and bring to market." What Does the CTO Do? Wright rose up the ranks within Red Hat and became the Chief Technology Officer (CTO)of the company. But what does the CTO of an open source tech

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice