Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (351)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 39 Next »

74%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
and run through the graphical installation process. You will find a detailed description of all the configuration options in the very comprehensive installation manual [3]. The installer automatically
74%
Rancher manages lean Kubernetes workloads
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sebastian Duda, 123RF.com
"Container Microdistributions k3OS and Flatcar" by Martin Gerhard Loschwitz, ADMIN , 2020, issue 60, pg. 24, https://www.admin-magazine.com/Archive/2020/60/Container-microdistributions-k3OS
74%
Offshoring and the Great Layoff
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Daniil Peshkov, 123RF.com
: https://www.cnbc.com/2022/12/19/roughly-1-in-3-workers-is-worried-about-a-layoff.html
74%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
a closer look at memory analysis tools such as Volatility and Mandiant Redline. Infos F-Response TACTICAL: https://www.f-response.com/software/tac dc3dd: http://sourceforge.net/projects/dc3dd
74%
Scalable mail storage with Dovecot and Amazon S3
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
://Accesskey:Secret@\ Bucket-Name.s3.amazonaws.com/ } Figure 2: The Dovecot website provides a PDF file that describes how to set up the enterprise repository and the S3 ... Admins can solve typical mail server scalability problems with Dovecot’s Amazon S3 plugin and the Ceph distributed object store. ... Dovecot and S3 ... Scalable mail storage with Dovecot and Amazon S3
74%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
https://github.com/jetstack/cert-manager/releases/download/v1.5.1/cert-manager.crds.yaml installs the Custom Resource Definitions required for cert-manager in the local K3s instance, and the command
73%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
libvirt , you can immediately start using virsh – at least normally you can. Many distributions, two of them being Debian and Ubuntu, have offloaded the libvirt tools into a separate package. In this case
73%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [3]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim
73%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
://www.nas.nasa.gov/assets/pdf/techreports/2003/nas-03-010.pdf NPB-GPU: https://github.com/GMAP/NPB-GPU NPB-CUDA and NPB-MZ-CUDA: https://www.tu-chemnitz.de/informatik/PI/sonstiges/downloads/npb-gpu/index.php.en 1SD Reduction: https://www.mathsisfun.com/data/standard-normal
73%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
of letters with similar-looking numbers and symbols), which is popular on the Internet. For example, the filter normalizes the string "Kn3rm@nn!" to "knermann" and rejects the password change. You can draw ... P@ssw0rdis@s3cr3t!

« Previous 1 2 3 4 5 6 7 8 9 10 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice