Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (585)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 68 Next »

8%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
8%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
for RHEL 7: https://static.open-scap.org/ssg-guides/ssg-rhel7-guide-C2S.html Lynis: https://cisofy.com/lynis/ FireHOL Cybercrime IP feeds: https://iplists.firehol.org Fail2Ban: https://github.com ... Building a defense against DDoS attacks
8%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
for alternatives to major leauge solutions. One good candidate, especially for smaller environments, is MicroK8s [2] from Canonical, void of bells and whistles. Another option might be K3s [3], which claims
8%
Getting data from AWS S3 via Python scripts
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © erikdegraaf, 123RF.com
Data produced on EC2 instances or AWS lambda servers often end up in Amazon S3 storage. If the data is in many small files, of which the customer only needs a selection, downloading from the browser ... Data on AWS S3 is not necessarily stuck there. If you want your data back, you can siphon it out all at once with a little Python pump. ... Data Exchange with AWS S3 ... Getting data from AWS S3 via Python scripts
8%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
private keys among servers. According to the DROWN website, "Many companies reuse the same certificate and key on their web and email servers, for instance. In this case, if the email server supports SSLv2
8%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
-core nodes, running from 2.33 to 3.0GHz, with 32 to 128GB of RAM per node. They also have a handful of NVidia-based GPUs for testing but are not ready for production work. These resources are connected
8%
Monitoring IPv6 with Wireshark
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Suzanne Tucker, 123RF.com
,536 seconds), but RFC 4861 limits the maximum to 9,000 seconds (2.5 hours). A value of 0 means that the router is not a default router and should not be entered in the default router list. The router lifetime
8%
What's new in Small Business Server 2011
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
A&M Rovenko, 123RF
than the SharePoint Services – but, more on this topic later. The new SBS again comes with state-of-the-art patch management based on Windows Server Update Services 3.0 SP2. Compared with predecessors
8%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
-log-bp namespace: kanister actions: backup: phases: - func: KubeExec name: backupToS3 args: namespace: "{{ .Deployment.Namespace }}" pod: "{{ index .Deployment.Pods 0
8%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
that is routed into the local site, the IPv4 nodes, in which dual-stack is enabled, create global unicast addresses, which can then be used to access the Internet (Figure 2

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice