Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (647)
  • Article (150)
  • News (126)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 93 Next »

28%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
, so all of the approaches discussed here may change in future releases. However, because a Crescendo package and the wrappers it generates work without an Internet connection once downloaded, your
28%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
that Security Onion now runs on basically any distribution that supports Docker. That said, it officially only supports the Ubuntu and CentOS distributions. For this article, I use the downloadable ISO file
28%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
command is provided as a static binary, so just download and make it executable, and it's ready to use. To set up Ignite use: sudo curl -sSLk "https://github.com/$(curl -sSLk https
28%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
]. You can download the source code from GitHub or obtain it from the project's home page [7]. Dhcpy6d intentionally violates the requirements of RFC 3315. Other tools, such as the ISC DHCP daemon, now
28%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
from Office 365 completely in Excel. You'll need Excel 2013 and .NET Framework 4.5 on your computer to perform an analysis using this tool. After logging on to Office 365, the tool will download
28%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
among pentesters and forensics experts. For this example, install Kali Linux and Ubuntu. As soon as the store has finished downloading the distributions, you will find both as icons in the start menu
28%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
Formation. Figure 1: The overall architecture of the system after successful deployment. The complete deployment is free to download on GitHub. VirtualBox, Vagrant, and Ansible versions should be the same
28%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
attached to the instance during its creation. Getting the Image with cloud-init Assuming you already have access to the tenant in an OpenStack environment, you can easily download a ready-to-use Open
28%
Four rescue systems compared
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Stephen Coburn, fotolia.com
for administrators to build a corresponding kernel themselves based on the rescue system. Rescue tools therefore must provide the option to download additional components or to distribute a modified version
28%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
a look at how easily a trojan downloaded from a popular registry (e.g., Docker Hub) might be installed into a public container image. Four Is the Magic Number Four key container security areas jump to my

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice