Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (347)
  • Article (83)
  • News (36)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 Next »

24%
Ubuntu 21.10 Server Edition (Live)
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
on Ubuntu KVM, so guest virtual machines can share resources. Edge use cases are addressed, as well, with a minimal system option at install time that uses less than 100MB of disk space. Other features
24%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3
24%
New features in MariaDB 10.3
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image by Adarsh Kummur on Unsplash
_name IN ('version','version_comment'); +-----------------+----------------+ | Variable_name | Value | +-----------------+----------------+ | version | 10.3.9-MariaDB | | version_comment | Maria ... What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now. ... MariaDB 10.3 ... New features in MariaDB 10.3
24%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Dec 9 09:11 microsoft.gpg which means only the root user can read and write to the file. The next step sets up the correct Apt package repository entry, which is ideal for security updates, new
24%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
, so the other must be the injected sidecar. A full description of one of these pods (Figure 7) shows that the Istio sidecar is indeed present: $ kubectl describe pod wordpress-77f7f9c485-k7tt9
24%
OpenStack Trove for users, sys admins, and database admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © cheskyw, 123RF.com
intervention by the user. The command: trove create lm-slave 1 --size 2 --slave_of ae427c76-eee3-11e6-802a-00215acd73e2 would add a slave node named lm-slave of flavor 1 to the database with the ID ae427c76
24%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
on Information, Computer and Communications Security, 2010. [7] A More Secure Cloud for Millions of Google Apps Users [8] A. Haeberlen, “A Case for the Accountable Cloud,” Proceedings of the 3rd ACM SIGOPS
24%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
the way back to well before Sinclair C5s were the rage – 1971 or so – an early edition of Unix incorporated a command called mail. So nascent was this embryonic operating system that it couldn't speak
24%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
Accounts: https://support.office.com/en-us/article/Configuration-of-General-and-Notification-Settings-6ad3a53f-470f-4f15-ad31-aca147385449
24%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
protocols, for example, http-brute, oracle-brute, and snmp-brute. default These are standard scripts that are used if you run Nmap with the -sC or -A options. discovery

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice