Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (290)
  • Article (39)
  • News (27)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36

13%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
.8.8.0/24 and 8.8.4.0/24, which are home to public DNS servers by Google, among other things. A prefix always defines the network portion of an IP address, and the length specifies the bits of the IP address used
13%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
hostname: "{{ item.public_ip }}" 39 groupname: frontend 40 with_items: "{{ frontendvm.instances }}" 41 42 - name: Wait for ssh of frontend 43 wait_for: 44 host: "{{ item.public_dns_name }}" 45
13%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
Installing file: /lib/libc.so.6 Installing file: /lib/ld-linux.so.2 Installing file: /lib64/libnss_dns.so.2 Installing file: /lib/libresolv.so.2 Evaluating: Exec Installing file: /bin/echo Evaluating: files
13%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
to which the individual servers are assigned. You might already have naming conventions for DNS entries or structuring for other systems, such as an organization-wide Active Directory that users are familiar
13%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
monitoring: Some ASM vendors have infiltrated dark web forums and attacker groups such as ransomware-as-a-service sites Brand protection: monitoring for brand misuse, from DNS manipulation to monitoring
13%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
for resolving IP addresses rather than DNS, but you could configure DNS if you like.) A quick peak at the dynamic_hosts file in the Warewulf database reveals: [root@test1 ~]# wwsh file show dynamic
13%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
: [http://www.fortinet.com/products/fortigate/] The Author Konstantin Agouros works for n.runs AG as a network security consultant. He mainly advises telecommunications providers. His book DNS
13%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
of the default route or the DNS server. They also include various settings that would involve major overhead if you wanted to implement them on a desktop PC (e.g., individual firewall rules for each app). Don
13%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
. The certificates encode a service account identity correlated with the cluster hostname or DNS name of the service that they represent. This is referred to as secure naming , and a secure naming check forms a part

« Previous 1 ... 29 30 31 32 33 34 35 36

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice