Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 48 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (346)
  • Article (107)
  • News (8)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 47 Next »

10%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
and criticized the payment of ransom across society [3]. Although many insurance companies will pay the ransom today, some providers have already explicitly ruled out payment. Of course, criminals are also
10%
Virt-builder generates VM images in a flash
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Petris, fotolia.com
for these systems; they normally reside in the builder/website/ directory [3]. To download, for example, an image for installing Fedora 19, change to the builder/website directory and issue the following command when
10%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
.14, although you can still resort to Docker Machine [3] in this case, which creates a virtual Linux system on the local host that you can then use to access the Docker engine. The example in Figure 1 uses
10%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
to create the hex string that Solaris expects as the PSK from the password of test123 . I set the encryption algorithm for the first negotiation phase to 3DES and the hash algorithm for authentication
10%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
time: 11.79 secs Data transferred: 2.47 MB Response time: 0.22 secs Transaction rate: 35.79 trans/sec Throughput: 0
10%
Prowling AWS
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Dmitry Naumov, 123RF.com
. For some additional context, sections on the AWS Security Blog [3] are worth digging into further. To bring more to the party, the sophisticated Prowler also stealthily prowls for issues in compliance
10%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7 # # ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs /00
10%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
 catatonit conmon containernetworking-plugins crun golang-github-containers-common   golang-github-containers-image netavark passt podman 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Need to get 32.3 MB of archives. After this operation, 131 MB
10%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
the data across all nodes: cockroach start --insecure --join=,,3> This ensures that the previously stopped node receives any updates that occurred during
10%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
of output provide information about the search and the type of output: # extended LDIF # LDAPv3 # base with scope subtree # filter: (objectClass=olcDatabaseConfig) # requesting: olc

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice