Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (302)
  • Article (71)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 Next »

17%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles. Big Deal? AWS IAM [3] lets you manage access to AWS
17%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
be in place, if you want the host to behave as it should: bridge-utils quantum-plugin-openvswitch-agent / quantum-l3-agent / quantum-dhcp-agent python-keystone / python
17%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
abuse of these devices by malware, it was necessary to disable this kind of access [3]. To remove this restriction, you need to rebuild the kernel without CONFIG_STRICT_DEVMEM , but this approach
17%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
tool. Enter GlusterFS (Figures 3 and 4). Figure 3: Internally, RHSS relies on Gluster software, and you can use many Gluster commands for storage
17%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
: It is not based on open standards, and it uses proprietary protocols and APIs like MAPI [3] for internal communication. Clients for Exchange are pre-installed on all Windows, Android, and Apple devices
17%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
. An alternative to Docker is CRI-O [3], which now officially supports Kubernetes. To use it on Ubuntu 18.04, you need to run the commands in Listing 1. As a first step, you set several sysctl variables; the actual
17%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
to its GPRS and 3G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
17%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14 virtual webs.test.com { 15 active = 1 16 ... 3
17%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
_httpboot 03 local bifrost_ironic 04 local bifrost_mariadb 05 local bifrost_tftpboot 06 07 # ll -h /var/lib/docker/volumes/bifrost_httpboot/_data/ 08 [...] 09 -rw-r--r-- 1 42422 42422 6.1G Mar 2 10
17%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
in 2014. At the time of writing, the available Kea versions were 2.2.0 (July 2022, Current-Stable) and 2.3.6 (March 2023, Experimental-Development). Most distributions have prebuilt Kea packages

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice