Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (160)
  • Article (95)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 Next »

17%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
/docker-registry $ htpasswd -Bbn oliver T0Ps3crEt | sudo tee /etc/docker-registry/htpasswd oliver:$2y$05$lAmkjHRcR0.TK52/rHR/Pe86AGZqpRleXenHVT/eabFe8He5UZiPu $ docker run -p 5000:5000 --name registry -v /etc
17%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
consisting of 80 cores with 4GB of RAM per core with basic storage of 500GB. POD pricing is based on cores/hour and would work out to be US$ 6,098.00/month or US$ 0.101/core·hour. A large example of 256 cores
17%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
; processes known as mongos route queries to the correct shard. The config server's metadata makes sure this happens. © MongoDB [3] Version 8.0 of MongoDB introduced embedded config servers, which means
17%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
and database. Becoming an 3l33t Haxx0r A fully operational database-driven Mutillidae II application is now ready, against which you can practice your ethical hacking skills. Before going a little deeper
17%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
{ "$schema" : "https://aka.ms/winget-packages.schema.2.0.json", "CreationDate" : "2024-03-05T03:41:14.411-00:00", "Sources" : [ { "Packages" : [ { "PackageIdentifier" : "Microsoft.VisualStudio.2022.Community
17%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
something like: $ cat cloudnativesecurity.cc -----BEGIN CERTIFICATE----- MIIF1zCCBL+gAwIBAgIRAK7AdUDa5C4Y1o6SSOX4aC0wDQYJKoZIhvcNAQEL ... Step 3 Now that you have the certificate you want to trust saved
17%
GNU Parallel: Multicore at the Command Line with GNU Parallel
04.11.2011
Home »  HPC  »  Articles  » 
command [3], you can use GNU parallel as a drop-in replacement and start executing many things at once right away. Surprisingly, the parallel command was not packaged for Fedora 13 or the Fedora Rawhide
17%
News for Admins
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
 
Marketplace (https://aws.amazon.com/marketplace/pp/prodview-xe2snnbtbhdpc?sr=0-1&ref_=beagle&applicationId=AWSMPContessa). Additionally, CIQ is now offering enterprise-level support (https ... In the news: CIQ Offers Long-Term Support for Rocky Linux on AWS; Apple's PQ3 Brings Post-Quantum Security to iMessage; Google Open Sources Magika File-Type Detection System; Microsoft Announces Sudo
17%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
in the neighbor cache. Display the contents of this cache using the command: netsh interface ipv6 show neighbor If you are already in the right context, simply type show neighbor, or the short form sh n (Figure 3
17%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles. Big Deal? AWS IAM [3] lets you manage access to AWS

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice