Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]time its go each real money[tippo365.com]time its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 98 Next »

9%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
the AMI ID page locator link above, you will have noticed that each AWS region has its own AMI IDs. Automation documents run in each region (per AWS account), and although with some Identity Access
9%
Deis combines Docker and CoreOS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © jager, 123RF.com
provides persistent storage to containers that need it. A centralized logging system uses Logspout and Logger. Via an API, the admin can find out the current state of each VM. A cache based on Redis speeds
9%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
return x The computed results are stored on disk in the JOBLIB directory below the directory defined by the cachedir parameter. Here again, each memorized function has its own subdirectory, which, among
9%
Parallelizing and memorizing Python programs with Joblib
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
def f(x): 07 return x The computed results are stored on disk in the JOBLIB directory below the directory defined by the cachedir parameter. Here again, each memorized function has its own
9%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
a legitimate system but is going to an unknown network. This traffic is often encrypted. Suspicious traffic that occurs over a long period of time. If I were going to attack a system, I would first discover
9%
Retention labels in Office 365
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © stokkete, 123RF.com
as soon as possible. Guidelines Each information item in Office 365 can be assigned a label that is defined by an internal policy. Automatic actions are then linked to this label. A label can only contain ... The Office 365 Security & Compliance Center provides a unified interface for managing policies and security settings, including retention labels, which specify how data is handled for compliance ... Office 365 Retention Labels ... Retention labels in Office 365
9%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
-blowing. Ultimately, this is what makes auditd so powerful: its ability to capture anything and everything going on within your systems. The following are samples from the bottom of the auditctl man page (note the -a
9%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
troubleshoot an issue. Seasoned admins will tell you that they almost always instinctively pull up the logs whenever they face any issues with their installations. Linux, for its part, is ever vigilant
9%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
.sock file, run df -h | grep sock to show that the mounted folder is present on the container. Assuming your NGINX container does not come with Docker pre-installed, go ahead and install it: apt update
9%
Securing containers with Anchore
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © loiic, Fotolia.com
2019, February 26, 2019, https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/ Anchore: https://anchore.com config.yaml: https://github.com/anchore

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice