Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: ▉tippo365.com▉fortune gets app calling solution▉tippo365.com▉fortune gets app calling solutionyc5 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (27)
  • Article (2)
Keywords

« Previous 1 2 3

21%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
: curl git pkg-config 0 upgraded, 3 newly installed, 0 to remove and 1 not upgraded. Need to get 3,409 kB of archives. After this operation, 19.5 MB of additional disk space will be used. Get:1 http://gb.archive.ubuntu.com
21%
Four solutions for Prometheus long-term storage
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sidewaypics, 123RF.com
the solution's query stack: An API relies on the PromQL interface to expose the service to the outside world. In Cortex speak, this is known as the Query Frontend. The front end keeps its own cache, which ... Four solutions for Prometheus long-term storage
20%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
and a volume using the built-in guidance wizard, which prompts you to select the preferred RAID type. In my case, JBOD, RAID 0, RAID 1, RAID 5, RAID 6, and even a proprietary solution called SHR were available
20%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
-discoverable credentials, multifactor authentication, authenticator apps, and other methods. SSH with public key authentication should be your default setting. Public Key Authentication To get started, you need to create
20%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
. Microsoft Defender to Start The core of attack surface mitigation on corporate assets consists of Microsoft Defender for Endpoint or Windows E5 licenses in an environment with Entra ID and Intune. In fact
20%
Developments in storage management
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by DESIGNECOLOGIST on Unsplash
in turn enables orchestration. Version 1.2.5a Swordfish from June 2023 (version 1.2.6 since January 22, 2024) delivers an extension of the DMTF (formerly known as the Distributed Management Task Force
20%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
into position between the client and the server. Getting Started Mitmproxy is available for Linux, macOS, and Windows. Standalone binaries are available for Windows and Linux, with distribution
20%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
Directive] is based on the principle of prevention; therefore, you look at what the attack vectors are so that if you do get compromised, you have an emergency management system in place, which ultimately
19%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
led to rapid and enthusiastic adoption across many science and engineering disciplines. It's one of only four languages [5] that have been deployed on supercomputers for petaflop computations (the

« Previous 1 2 3

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice