Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 160 Next »

38%
Container IDE with cloud connection
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Christin Hume on Unsplash
choice does not provide. Developers either have to grin and bear the installation overhead, or they can resort to a virtual machine or Docker image. Although this solution might work well for individual
38%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
more complex data schemas. The number of threat vectors resulting from mobility, social media, and virtualized cloud networks does not make things any easier. For example, it takes an average of 146 days
38%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
communications. In doing so, the attacker does not have to redirect the traffic completely or impersonate the data target. Instead, they can sniff the data on the network and then let it continue to the intended
38%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
conditions. The standard procedure in such situations – more RAM – sometimes does not solve the problem. In this article, we first describe the problem in more detail, analyze the background, and then test
38%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
/share/tracker/data/tracker-store.journal. Changes to the filesystem will have an effect. If the journal does not change, it also means that the tracker processes have completed all pending work and that all data is covered by the full-text index
38%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
only changes the address in Keystone and does not have to change all configuration files for each service on each host. Image Management: Glance Cloud offerings designed for use in the web interface
38%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
crossing the VM barrier. Aggravated in the Cloud The risk potential is far greater when the environment does not operate under a single, uniform management system, such as the case where individual
38%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
that regularly make the biggest security mistakes are those that have little or nothing to do with software. Just because you build good washing machines does not automatically make you an innovative IT company
38%
The 10 best tricks for taming Ansible
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © neoleo3d, 123RF.com
to avoid typing or because of a belief that names are not absolutely necessary for individual instructions. Although it is true that names are not required – a block of statements that does not have
38%
Working with Microsoft Azure RemoteApp
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © bloomua, 123RF.com
, and the "Standard" plan focuses on users with higher requirements. Microsoft sadly does not reveal any more about the technical background, meaning a test is needed. If it turns out that the performance of a Remote

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice