Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00s Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (315)
  • Article (114)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 44 Next »

28%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
connections or change quality of service (QoS) in minutes, rather than months. Users want additional functionality, such as enhanced security, on demand and only for specific data streams, time periods
28%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
granted—that is, from being able to obtain elevated privileges. For example, imagine that user Alice has permissions only to launch EC2 instances and to work with Amazon S3 buckets, but the role she passes
28%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
 plugin for Amazon Simple Storage Service (Amazon S3) 20    - sftp plugin for SSH File Transfer Protocol 21    - ebs plugin for Elastic Block Storage 22    - local plugin for Local file system 23
28%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
environment provides impressions of the insights Prometheus delivers into a Kubernetes installation. The Prometheus configuration is oriented on the official example [3]. When querying metrics from
28%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
and anomalies, potentially indicating that attacks are in progress. Even distributed denial-of-service (DDoS) attacks have ceased to follow the principle of taking a server offline with as much traffic
28%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
(ADE-OS). The current version 3.1 is a Red Hat Enterprise Linux version 8.2. Full root access is reserved for the manufacturer's Technical Assist Center. Some services are run as microservices in Docker
28%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
. The previously mentioned riemann-cli tool tests mail delivery: riemann-cli send --service=Mailtest --metric="3l337" --state=error -ttl=20 --description="Mail function test" --tags=riemann test www This command
28%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
/pki/tls/certs/ldap.acme-services.org.crt $(openssl x509 -in ldap.acme-services.org.crt -noout -hash).0 After these two steps, you can check the server certificate with the openssl command, which provides the s_client command for this purpose
28%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
will also use the secure or insecure variants of the SMTP, IMAP, and POP3 protocols. Email can also be encrypted and signed using PGP or S/MIME. Postmaster modules allow the admin to add an X-OTRS header ... 20
28%
Getting a free TLS certificate from Let's Encrypt
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Stuart Miles, 123RF.com
information [2]. You can use Let's Encrypt for any website regardless of the web server. For my home-grown sites, I use one ESXI VMware server and deploy pre-installed virtual machines using TurnKey Linux [3

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 44 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice