Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (55)
  • Article (14)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

32%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
in Windows 10 and Server 2019 can create firewall rules for each process in the Windows Subsystem for Linux and is essential if you are running containers or outgoing connections from Linux processes
32%
Setting up the lightweight Lighttpd web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Brett Jordan on Unsplash
of ==, a != tests for inequality. Additionally, more complex rules can be formulated with regular expressions. Lighttpd evaluates settings in the curly brackets if the regular expression to the right of =~ is true
32%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
: # rdiff-backup --remote-schema 'ssh -C %s sudo rdiff-backup --server' \ rdiff@192.168.56.105::/etc /mnt/backup Backups via SSH are part of the rdiff-backup standard repertoire. It supports both pull
32%
NAS with Btrfs-based Rockstor
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Lane Smith on Unsplash
that no password is required when accessing the share. Write access is allowed if Read only is set to no . After clicking Submit , the share is available on the network. As a rule, you only need to access the URL
32%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
the address, netmask, and gateway as follows: iface eth0 inet static address 192.168.7.50 netmask 255.255.255.0 gateway 192.168.7.1 The address reveals that the network is private, that is, an RFC  1918
32%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
is now familiar with applications like Dropbox, Facebook, Twitter, and Skype and thus allows more finely tuned firewall rules (Figure 1). In version 3.0, the Endian Firewall also replaces the ntop tool
32%
Deis combines Docker and CoreOS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © jager, 123RF.com
created a system of rules for building portable applications that run easily on PaaS platforms. Deis sticks rather precisely to these rules. These "12 factors" [13] serve as guidelines for building Paa
32%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
/microsoft/omsagent/bin/service_control status and ensure that the agent is running and connected to the Log Analytics workspace. Now configure data collection rules within the Azure Portal by navigating to your Log Analytics workspace
32%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
for numerous applications and services, it would be wise to watch this space for future versions. Listing 2 shows off the settings available for applying various rules to logfile inspection. As you can see, it
32%
Server administration using Cockpit
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexandr Marinenko, 123RF.com
.bz2 archive out of the latest stable Cockpit version from the GitHub repository [6], unzip it, and then compile Cockpit using the well-known rule of three: ./configure make make install You then need

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice