Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (387)
  • Article (143)
  • News (6)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 54 Next »

17%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
(Listing 1), which indicates a push. Listing 1 Server Push in Log 2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0" 2020-11-22T12:01:10+01:00 1606042870.567 200
17%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
the data across all nodes: cockroach start --insecure --join=,,3> This ensures that the previously stopped node receives any updates that occurred during
17%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
", 19 "VERSIONEDCONSULREGISTRATION": "false" 20 }, 21 "retry_join": [ 22 "consul.datacenter-a.internal.myprivatedns.net" 23 ], 24 "server": true 25 } The Amazon
17%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [3]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim
17%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
SeverityValue = 3; else $SyslogSeverityValue = 6; 20 21 # The name of the file is also sent with the file 22 Exec $FileName = file_name(); 23 24 # The SourceName variable is set by default to 'NXLOG'. To send
17%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
7236f7b5c3dd2f75672c3d2b8dfd4df3a3eea6-silicon-heatwave-the-looming-change-in-data-center-climates.pdf Tape storage and carbon emissions: https://www.backupworks.com/tape-storage-reduce-energy-consumption-and-carbon-emissions.aspx
17%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
]. Distributions in the Microsoft Store Debian GNU/Linux Fedora Remix for WSL Kali Linux Ubuntu 22.04 LTS, 20.04, 20.04 ARM, 18.04, 18.04 ARM, 16.04 SUSE Linux Enterprise Server 15 SP3, 15 SP2
17%
Puppet Bolt orchestration tool
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by lee junda on Unsplash
docker-compose.yaml version: '3' services: target1: build: . ports: - '3000:80' - '2000:22' container_name: target1 target2: build
17%
Integrating FreeIPA with Active Directory
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © payphoto, 123RF.com
, these days, the System Security Services Daemon (SSSD) [2] is used most of the time in such scenarios. This approach, together with the software [3], is the simplest way to integrate Linux clients directly
17%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
# Jenkins home directory is a volume, so configuration and build history 22 # can be persisted and survive image upgrades 23 VOLUME ${JENKINS_HOME} 24 USER ${JENKINS_USER} 25 26 ARG JENKINS

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice