Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: virtual ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (36)
  • Article (6)
  • News (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 Next »

12%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
is restricted, so you need to access the instance with cloud.key from the key pair used on instance creation: $ ssh -i ~/.ssh/cloud.key centos@192.168.2.235 After accessing the instance, it's vital to check
12%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
for the spidering of sites through link identification and scraping of pages in the Robots.txt file. Spidering is a vital piece of any security assessment, because it can yield administrative access pages, test
12%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
and enumerating systems. Therefore, it's vital that today's security workers spend considerable time creating solutions that catch long-term attacks. An understanding of the unexpected places where the attackers
12%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
DB offer a monitoring agent (Node Exporter and Telegraf, respectively) that regularly reads the basic vital values of a system, even in the standard configuration. These tools allow you to collect values
12%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
utilities based on the Secure Shell (SSH) protocol, which is vital for secure communication over unsecured networks," Jogi explains. "OpenSSH versions earlier than 4.4p1 are vulnerable to this signal handler
12%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
couldn't be more wrong. Email is vital for many businesses because it allows them to deliver messages to both customers, employees, and associates by standard, open protocols that are not controlled
12%
Samba 4 appliances by SerNet and Univention
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Ricky Grant, 123RF.com
synchronizes the system time, which is vital for Kerberos authentication. The fastest approach to automatic installation is to run the standard Debian installer. The automated installation in text mode
12%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
enough to run Monit and configure more checks covering other vital server resources. The Monit documentation provides complete detailed information about various resources and the corresponding
12%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
, it will instantiate the service with the specified volume. Data persistence isn't confined to just storing data; backups are equally vital. Use docker cp to copy files or directories between a container and the local
12%
Fast and scalable ownCloud Infinite Scale
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Markus Spiske on Unsplash
metrics, such as disk space in use, CPU usage, or other vital parameters. Combined with the Jaeger client, it even becomes possible to do in-depth performance debugging of individual oCIS components in case

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice