Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 149 Next »

15%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
In the past, we ran applications on physical machines. We cared about every system on our network, and we even spent time discussing a proper naming scheme for our servers (RFC 1178 [1
15%
NIST Releases Cloud Definition and Roadmap
28.11.2011
Home »  News  » 
 
-145). The new official NIST definition calls cloud computing a "model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers
15%
IPFire Improves Its Intrusion Prevention System
16.06.2022
Home »  News  » 
 
and testing far easier), which equates to faster rule updates and an automated check if a ruleset was updated. The latest release is also better capable of preventing network spoofing attacks, has tightened
15%
Rocky Linux 9 (x86_64)
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
.14.0-70 OpenSSL 3.0.1 OpenSSH 8.7p1 SELinux performance improvements Automatic configuration of security compliance settings NetworkManager key files for new profiles GCC 11.2.1 Go 1
15%
OpenCanary attack detection
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
is to uncloak the perpetrators' actions and, in particular, how they move around the network (lateral movement) or what information they access. Honeypots are also deployed to capture email spam. Email accounts
15%
Fedora 18
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
pools, and snapshots, and a collection of new storage management tools simplifies administration of network-attached storage and storage area networks. The newest Fedora also includes Samba 4, which
15%
Avoiding KVM configuration errors
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dan Barbalata, 123RF.com
; that is, it only enters the game if the guest needs not only more CPU and main memory, but also hard disks, the network, or the graphics adapter. Not even the team of Qemu and KVM can successfully cover
15%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
, my opinion is that if a node can’t run a job (an application), that node is “down.” However, not being able to run a job encompasses many system aspects, such as network connectivity, storage
15%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
machine repository. Thus, the front end also runs a transfer service to manage the transfer of virtual machine images to the concerned worker nodes. An important aspect of clouds are virtualized networks
15%
NFS and CIFS shares for VMs with OpenStack Manila
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Steve Everts, 123RF.com
Stack and NFS can fundamentally be operated together without separate components. The simplest scenario is to start the VMs of a setup on a private network and then run an NFS server on one of the VMs. However

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice