Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (344)
  • Article (120)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 Next »

12%
OpenStack Sahara brings Hadoop as a Service
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © RFsole, Fotolia.com
://docs.openstack.org/developer/sahara/ Figure 1 acknowledgment: http://docs.openstack.org/developer/sahara/architecture.html Build images: http://docs.openstack.org/developer/sahara/userdoc/diskimagebuilder.html DRBD: http://drbd.linbit.com
12%
Overview of cloud platforms and appliances
15.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
. Fortunately, Microsoft has seen the issues and has announced changes through blogs and developer conferences under the code name Next Generation Active Directory (NGAD). NGAD will make Microsoft Windows
12%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
see an image that uses Alpine Linux as its base (Listing 1). Listing 1 Endlessh Dockerfile FROM alpine:3.9 as builder RUN apk add --no-cache build-base ADD endlessh.c Makefile / RUN make
12%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
.2. Weak hash functions, namely SHA-1 and MD5, are disallowed in favor of SHA-256 and SHA-384, with a few notable exceptions. The use of SHA-1 is permitted with respect to client and server certificates (but ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way. ... TLS 1.3 ... TLS 1.3 and the return of common sense
12%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
SQL password, if necessary, on the Docker Hub Overview page [5]. Listing 1 The nowasp Dockerfile 01 FROM tutum/lamp:latest 02 MAINTAINER Nikolay Golub com> 03 04 ENV DEBIAN
12%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
matches a domain that has been verified in Azure AD. Otherwise, Azure AD selects the tenant name as the UPN for unrecognized UPNs which then look a bit like this: jennifer@frickellab.onmicrosoft.com
12%
Improving performance with environment variables
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © sgame, fotolia.com
the application can't be found? To debug the issue, probably the first thing to check is your PATH [1], which is "an environment variable … that tells the shell which directories to search for executable files
12%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
that interesting things could still happen. Consolidation was in the cards when Telligent took over Zimbra almost two years ago. Telligent has been trading under the evidently better known name since September 2013
12%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
line. For example, the command below uses ssh : $ pdsh -w ssh:laytonjb@192.168.1.250 uname -r 192.168.1.250: 2.6.32-431.11.2.el6.x86_64 You just put the specific rcmd module before the node name
12%
A storage engine for every use case
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Maikloff, Fotolia.com
tables, you just query an ephemeral table, keeping in mind its name pattern. For example, SELECT seq FROM seq_1_to_10_step_2; returns all numbers from 1 to 10, incremented by 2 (pair numbers). Slightly

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice