Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%2009 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (233)
  • Article (77)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 Next »

26%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
online [1]. If you want to test the Enterprise version, you can request a test key and the download link from the website [2]. Sophos UTM – first introduced in 2000 as Astaro Security Linux – has ... 20
26%
Enterprise resource planning and customer relationship management with open source
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © ximagination, fotolia.com
, ilscipio GmbH received the Innovation Award from "Initiative Mittelstand" (SME Initiative) in 2012 and was also responsible for implementing OFBiz at Web.de. Opentaps ERP + CRM URL: http
26%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
-lstar /usr/lib64/libganglia* 104 -rwxr-xr-x 1 root root 106096 May 7 2013 /usr/lib64/libganglia-3.6.0.so.0.0.0* 0 lrwxrwxrwx 1 root root 25 Feb 10 17:29 /usr/lib64/libganglia-3.6.0.so.0
26%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
socket 02 03 def handler(event, context): 04 data = socket.gethostbyname_ex('devsecops.cc') 05 print (data) 06 return Listing 2 Access Permissions { "Version": "2012
26%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
during this process, you can avoid config drift by running them every 20 minutes or so over the resulting instances – which introduces the holy grail: idempotency. Simply put, that means you can
26%
Sustainable Kubernetes with Project Kepler
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Hassan Pasha on Unsplash
for Kubernetes. Prometheus is a tool for recording, storing, and querying time series metrics. Created by SoundCloud in 2012 and adopted by the CNCF in 2016 (as their second project after Kubernetes itself
26%
Have a Bash with the Zing network utility
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Micah Tindell on Unsplash
" by Chris Binnie, ADMIN , August 2012. https://www.admin-magazine.com/Articles/Netcat-The-Admin-s-Best-Friend, Accessed March 25, 2023. Yerrid, K.C. Instant Netcat Starter . Packt Publishing Ltd., 2013
26%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
of desktop virtualization are obvious: Where do you get the biggest profit, and were your expectations met here? Sascha Karbginski: We provide 2,000 desktop workstations to our employees in 560 branches
26%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
an evaluation version of Filr 1.0 [2] in the form of an Open Virtualization Format virtual appliance (Filr.x86_64-0.0.459.ovf.zip) from the Novell download page [3]. Although you can run this for a quick test
26%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
name. By default, Windows Server 2012 R2, for example, tries to resolve the name to the IPv6 address, resulting in undesirable messages. Figure 3: Error

« Previous 1 ... 28 29 30 31 32 33 34 35 36 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice