Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (289)
  • News (28)
  • Article (8)
Keywords

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 Next »

47%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
the installation, type rvm use to change to the Ruby environment. rvm use 1.9.2 changes to the version installed in the example here. The version provided by the system can be re-enabled at any time by typing rvm
47%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
is available for download from the provider, Tenable. It can also be set up on a virtual machine (VM). For this example, I use Nessus on a Kali installation running in Hyper-V on Windows Server 2025
47%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
, which made it easy for Veeam to package, deploy, and manage Kanister, providing a range of Kubernetes resource definitions. In total, Kanister comprises three main components: one controller and two
47%
PipeCD for CI/CD
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Kazuo ota on Unsplash
a virtual data center, providing dynamic functions such as network and storage, which means workloads can be orchestrated by a fleet of systems. However, Kubernetes (K8s) is known for its complexity
47%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
Version 4 (TCP/IPv4) provide various settings, such as integrating Windows into a Windows domain. The settings are prone to incorrect configurations, so you should check them after setup or if you
47%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
to leave the maintenance of the application ecosystem to third-party providers of the respective tools. However, in the security context, container-based workloads come with challenges that do not exist
47%
SC25 Highlights
20.01.2026
Home »  Articles  » 
 
for data centers. Some companies are developing and are now offering jet engines to provide power. Aircraft manufacturer Boom Supersonic is developing natural gas turbines for power generation. These engines
47%
Container compliance with dockle
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
functionality. Listing 5 shows the example provided for a GitHub action failing on a WARN check level. (The dockle software comes with a variety of warnings (Table 1) that should help you grade the level
47%
Manage and automate networks
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
). The sensor can then be linked to other actions or workflows to provide an automatic response to the IP address failure, which could mean notifying an admin or starting a troubleshooting process. Creating
47%
Open source remote access to Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Nikolay Okhitin, Fotolia
Access FreeNX [2] is a great remote access program. It uses the NX protocol, which was released by NoMachine [3] as open source. According to the FreeNX website, the product "provides near local speed

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice