Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (415)
  • Article (51)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 47 Next »

86%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
://riemann.io How Riemann works: http://riemann.io/concepts.html Bug report for the initscript on Cent OS 7: https://github.com/riemann/riemann/issues/453 Riemann data types: https://groups.google.com
86%
Booting Windows from a compressed image
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © ximagination, 123RF.com
.0 is initially in this folder. Now update it to version 5.1. To do so, download the MSU files for Windows 8.1 Update [6] and the update for Windows 8.1 [7]. Then, copy the seven MSU files into their own directory
86%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
the docbook-to-man tool. The program documentation contains timestamps, for example, as do HTML pages made by Doxygen [7] or PDF documents built with LaTeX [8]. Problems are also caused by different lists
86%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
_domains = "*" # Keycloak configuration oidc_issuer_url = "http://localhost:8080/realms/testrealm" provider = "keycloak-oidc" client_id = "proxy" client_secret = "t1BmFL4HHk7xC6nPYJEMfiprMfw1QK7b" # Cookie settings cookie
86%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
. On Linux, Yacht supports the x86_64 and ARM architectures, with packages for the ARMv7 and Raspberry Pi ARM64. It does not support other operating systems. On the software side, the tool only requires
86%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
for a Playbook on the ADMIN FTP site [7]. Thanks to the structure of these roles, you can add more nodes by appending parameters to the Hosts file, and it includes installing the software on the node. The roles
86%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
crunch away on installing MariaDB. The first step is to download and run the MariaDB repo setup script: wget https://downloads.mariadb.com/MariaDB/mariadb_repo_setup chmod +x mariadb_repo_setup sudo
86%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
86%
Handy Windows tools for sniffing network traffic
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Barna Tanko, 123RF.com
, the tool checks the first bytes of the data stream. If the bytes contain characters lower than 0x20 (excluding CR, LF, or Tab characters), the tool automatically shows the information in Hex mode; otherwise
86%
Get Started with Parallel CPython
07.11.2011
Home »  HPC  »  Articles  » 
understanding of parallel computing [1]. I used the Ubuntu 9.10 x86_64 desktop distribution along with Python 2.7 to test the code in this article and to generate the screen shots. Breaking GIL and Extracting

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice