Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 216 217 218 219 220 221 222 223 224 225 226 227 228 229 ... 261 Next »

36%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
security holes that have become public. The service engineers who replace relays and bearings in washing machines are highly unlikely qualified to help customers install new firmware. Often, manufacturers
36%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
exponentially. A direct comparison of the old and new worlds quickly illustrates this, and a database, as mentioned earlier, is an ideal candidate. Clients establish persistent connections to a database
36%
Manage projects in SMEs with OpenProject
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pedro Miranda on Unsplash
. Installing new network storage, for example, can be such a case, and it can be broken down into quite a few smaller units. From planning, to requests for quotes, procurement, physical installation in the rack
36%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
Kubernetes is one of the most dazzling attractions in the current circus of IT tools. Once developed by Google, it is now under the aegis of the Cloud Native Computing Foundation (CNCF) and has
36%
Samba domain controller in a heterogeneous environment
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Zachary Nelson on Unsplash
-winbind krb5-kdc libpam-krb5 -y The basic Samba installation comes with a configuration file as a template. However, the ADS setup creates a new one, so you need to remove the old one by typing rm /etc
36%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
you have selected the Christa user account. Now you can display the second object with another search. If you open the context menu again, you will see the Compare to 'Christa' SD item. A new window
36%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Jack Hunter on Unsplash
activities, it now also handles tasks under the hood of the Windows Subsystem for Linux (WSL). Graphical Linux Apps The second version of WSL sees Microsoft place the subsystem on completely new
36%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
, a "real-time HTTP intrusion detection" tool [2]. Judging by the age of the commits on its GitHub page, it's a relatively new project, but I found its uncomplicated ingenuity exceptionally intriguing
36%
Keeping it simple – the Ansible automator
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Komkrit Suwanwela, 123RF.com
forever. However, Red Hat, as the new owner of the solution, is doing its best to implement changes carefully and, moreover, to design them such that administrators do not necessarily have to use them
36%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
scripts. For administrators, identifying existing and new vulnerabilities in the IT infrastructure is an essential task. It is a matter of getting there before others do. Although Nmap is not a security

« Previous 1 ... 216 217 218 219 220 221 222 223 224 225 226 227 228 229 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice