Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 71 Next »

11%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
/bin/ksh' user_gecos: 'AIX guest user' user_pgrp: 'staff' user_groups: 'staff' user_fsize: '-1' user_passwd: "{ssha256}06$FkFHd0q1hxVonC2a$sa1WA0G3mPNWtz2GAhUkfcQ7BkD/mNngBu0Tn2.N.cl" collections
11%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
 3.5.0-44-generic (hercules)         03.12.2013      _x86_64_        (2 CPU)    09:46:03      runq-sz  plist-sz   ldavg-1   ldavg-5  ldavg-15   blocked 09:46:13
11%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
disks of different sizes in your setup or if you want to distribute data across multiple fire zones in a cluster. Rook, however, does not map the manipulation of the CRUSH map, so corresponding API calls
11%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
for Boxcryptor. Data can be encrypted in the Boxcryptor drive via the context menu of encrypted files. This is useful is users want to share files via OneDrive (Figure 3
11%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
11%
Scanning servers with Nikto
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © spleen87, photocase.com
that is released under the GPL. Figure 3: The gooey version of Nikto for Macs; source: http://www.informationgift.com/macnikto. The End Is Nigh Fortunately
11%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
. Specifically, the Commands block expects another field that describes the parameters. It is important to note that you do not need to declare all the parameters supported by the binary to be called in your
11%
Back up virtual machines and clusters
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © ximagination, fotolia.com
tracker creates a bitmap of all the blocks on the virtual hard drive. As soon as the data in a block changes, it is marked accordingly. At the time of a backup, the backup software only needs to check
11%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
-compliant transactions, which are essential for maintaining data consistency in applications that require complex operations. The database achieves this state by using a consensus algorithm called Raft to keep replicas
11%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
that addresses both external threats and internal vulnerabilities. Misconfigured security rules, particularly in NSGs or Azure Firewall, can lead to the exposure of sensitive data or unauthorized access

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice