Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (414)
  • Article (120)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 54 Next »

59%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
://cloud.centos.org/centos/7/images/CentOS-7-x86_64-GenericCloud-1808.qcow2 Because you are going to use the image on a tenant only, you can upload it as a private image available exclusively in your project. First, you need
59%
Use PowerShell to manage Exchange Online
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © reddogs, 123RF.com
], a newly developed platform-independent version of the scripting language. PowerShell Core is based on .NET Core. PowerShell Core 6.x can be installed on Windows computers with Windows 7 or higher
59%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
Software services packaged as containers finally reached the remotest corners of IT about three years ago. Docker [1], rkt [2], LXC [3], and the like see themselves confronted with technologies
59%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
for different security requirements: GnuPG Desktop [3] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
59%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
 ~ # cd /etc/audit/ chrisbinnie audit # ls auditd.conf  audit.rules  rules.d   chrisbinnie audit # ls -al total 20 drwxr-x---  3 root root 4096 Dec 16 12:34 . drwxr-xr-x 95 root root 4096 Dec 16 12:34 .. -rw-r-----  1 root
59%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
.conf audit.rules rules.d chrisbinnie audit # ls -al total 20 drwxr-x--- 3 root root 4096 Dec 16 12:34 . drwxr-xr-x 95 root root 4096 Dec 16 12:34 .. -rw-r----- 1 root root 701 Dec 9 2014 auditd.conf -rw
59%
Ralph, the open asset management tool
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sebastian Duda, 123RF.com
. At he time of writing, Ralph 3.0 is in the final stages of the release process (as of the end of May). Before installing, make sure that you have a new Ubuntu 14.04 installation with no other packages
59%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
% parallelizable (20% is serial, primarily because of I/O). For one process, the wall clock time is assumed to be 1,000 seconds, which means that 200 seconds is the serial portion of the application. By varying
59%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
, prevent user tracking and advertising on websites. Moreover, researchers at the University of Bonn have shown that almost 20 percent of HTTP requests load advertising content and that blocking these ads
59%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
the wget command shown in Listing 3 with its output to download the revershell file. Now make the module executable and insert the module into the host: chmod +x revershell.ko insmod revershell

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice