Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (277)
  • Article (100)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 Next »

17%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
backend3.example.com server; 05 backend4.example.com server down; 06 backend5.example.com backup server; 07 } 08 09 upstream fallback { 10 fallback1.example.com server: 8081; 11 } 12 13 14 server { 15 % 16
17%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
of the Nginx web server, the ngx_http_v2_module module replaced its predecessor ngx_http_spdy_module in September 2015 (Nginx 1.9.5). April 2016 saw the module enter the stable branch (Nginx 1.10.0) [3
17%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
-Manage: novammanage user admin rwartala This process creates an access key and a security key: export EC2_ACCESS_KEY=713211a477a154470fUU ae543346b52e30a0e export EC2_SECRET_KEY=244de6a188aa344e12UU 9521003ac756abbdf
17%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
of security. If you previously set a rule for incoming network traffic, now is the time to configure the Source filters. These can be IPv4 or IPv6 address ranges, tags, or service accounts. The Destination
17%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
at the data center [3]. To allow authorized users to work with the required programs and data, PCoIP can allow or prohibit looped USB devices explicitly. Workstation with Host Card With a host card, you can
17%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
enabled: yes 48 state: started 49 daemon-reload: yes 50 name: "{{ item }}" 51 with_items: 52 - squid 53 - socat 54 - socat443 Listing 6 handles the internal VM
17%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
Connect [3], the Confluent Schema Registry [4], Kafka Streams [5], and ksqlDB [6] are examples of this kind of infrastructure code. Here, I look at each of these examples in turn. Data Integration
17%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
(xrandr) "provides automatic discovery of modes (resolutions, refresh rates, …) [and] the ability to configure output dynamically (resize, rotate, move, …)" [3]. The xrandr configuration tool lets me
17%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
. Here are some examples: _{3,} – Three or more consecutive underscores · {2,5} – Between two and five spaces in a row (where · is a space) (the·){2} – Two consecutive
17%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
to achieve a particular CMMC level as a condition of contract award. Building on the National Institute of Standards and Technology special publication (NIST SP) 800-171 (DoD Assessment Methodology) [3

« Previous 1 ... 30 31 32 33 34 35 36 37 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice