Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 Next »

31%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
on a plain vanilla RHEL 8 Docker, you can easily start a Docker image there that you previously created on your Ubuntu PC. Quite a few users already consider containers to be the logical continuation
31%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
]. This protection is aimed at websites that could jeopardize a users' security by transferring login data unprotected. As a side effect, the function also provides protection from SSL stripping. HSTS (RFC 6797) [8
31%
AppScale AWS clone for private clouds
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Karel Mistrik on Unsplash
earlier. The rule is that each availability zone has its own Ceph cluster for block device storage. At the cloud control plane level, another Ceph cluster is added to provide object storage with a Simple
31%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
to comply with security rules, regulations, and guidelines exposes an organization to potential legal and security risks. For this reason, you must include compliance criteria within your CI/CD pipeline
31%
Keeping Azure VMs up to date
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Brian Welker, 123RF.com
of Azure Monitor to include update management. Besides Windows Server, the supported operating systems include CentOS, RHEL, and SUSE version 12 or newer, as well as Ubuntu. You cannot update Windows 7, 8
31%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
.2 system (other distributions may behave differently). For my system, I define the log and its location in the file /etc/rsyslog.conf . The file should have a RULES section that looks like Listing 2
31%
Flatpak, Snap, and AppImage
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Quino Al on Unsplash
as the kernel and all other processes. Isolation from the rest of the environment only occurs if you take care of this yourself with tools such as chroot [8], SELinux [9], or AppArmor [10]. Flatpak's structure
31%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
an email format, and uses a routable company domain. Ownership of this domain is checked later by Azure, which rules out cheating. Assigning Privileges In the fourth step (Optional Features ), you can
31%
Open source monitoring with Zabbix
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Vincentiu Solomon on Unsplash
the corresponding user macro for this trigger function as shown in Figure 8. You always need to specify the item referenced in a trigger definition with its item key. The key uniquely identifies each item on a host
31%
The light-footed Hiawatha web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Olexandr Moroz, 123RF.com
is that, for a long time, web servers have almost completely ignored this attack vector and declared themselves not responsible. Hiawatha has been a clear exception to this rule for a long time: The server

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice