Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (311)
  • Article (76)
  • News (8)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 40 Next »

11%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
) provides a simple and secure way to make public keys for email addresses available over HTTPS. The underlying standard was first implemented in GnuPG version 2.1.12 and has been enabled by default since
11%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
/bin/rpi-update \ https://raw.githubusercontent.com/Hexxeh/rpi-update/master/rpi-update && \ chmod +x /usr/bin/rpi-update 08 $ sudo rpi-update 09 $ sudo reboot I enabled SNMP agents on all the access points used
11%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
(minified by 25.99X) from python:2.7-alpine - 84.3MB => 23.1MB (minified by 3.65X) from python:2.7.15 - 916MB => 27.5MB (minified by 33.29X) from centos:7 - 647MB => 23MB (minified by 28.57X) from centos ... DockerSlim minifies your Docker container images up to 30x and adds security, too.
11%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
.0 was released in December 2009. The interface allows an SDN controller to reach beyond routers and switches, which was previously impossible. SDN is controlled in infrastructures by OpenFlow with Open
11%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
="chmod --- > RQRDCMNDS="apt-get > chmod 13a17 > mkdir 15a20 > usermod 35c40 < if ! wget "https://mmonit.com/monit/dist/binary/${MONITVER}/monit-${MONITVER}-linux-x64.tar.gz" -O /tmp
11%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
in the container? 20 - name: "mysql client exists" 21 path: '/usr/bin/mysql' 22 shouldExist: true 23 24 # Does the MySQL configuration file exist at the right place? 25 - name: "my.cnf exists and has appropriate
11%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
objectClass: person 20 objectClass: organizationalPerson 21 objectClass: inetOrgPerson 22 objectClass: posixAccount 23 cn: Ulrich Habel 24 gidNumber: 100 25 homeDirectory: /home/uhabel 26 sn: Habel 27 uid
11%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
in turn stores as a separate time series. The software can already cope with millions of time series, yet version 2.0 [6] should cover more extreme Kubernetes environments with thousands of nodes
11%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
be turned on and off according to what you want to check about the state of the node. Almost 20 years ago, when I worked for a Linux high-performance computing (HPC) company that no longer exists, we had
11%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
standard. In October of 2012, the winner was chosen: the Keccak algorithm, which was developed by a team of Belgian scientists. This is the second competition of this type: The symmetrical encryption

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice