Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 98 Next »

8%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
for the first time, it does not have an Authelia session cookie. In this case, the tool redirects you to its own login page, where you first need to verify your ID by providing a username and password. Double
8%
Drush vs. Drupal Console
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © iofoto, fotolia.com
, go ahead and run the init command now. drupal init --override Great, now you have a fully working version of Drupal Console. You can output a list of available commands at any time by running
8%
Spotlight on the Kubernetes package manager, Helm
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Nick Fewings on Unsplash
. Figure 3: The Helm CLI and its library are available on various systems – in this case, for macOS with the Homebrew package management system. Once Helm is available locally, you're ready to go. Each
8%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
. Figure 4: Cumulus on switches offers many advantages: You can resort to a real Linux distribution in which each port is a separate interface. Of course, you can set up an IP fabric like the one I
8%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
Stack cloud would be a real pain for cloud administrators. Of course, you could use popular automation tools (e.g., Ansible, Chef, Puppet) to make a post-installation configuration on the virtual machines ... Today's OpenStack has become a mature product with automated asset configuration tools, including cloud-init, a powerful script that saves time by automatically configuring a large number of virtual
8%
Test mechanisms for best practices in cloud design
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Zlatko_Guzmic, 123RF.com
security incidents. Reliability focuses on ensuring that the workload performs its intended function correctly and consistently at the right time. A fail-safe workload ideally recovers quickly from outages
8%
Improved logging in Samba Winbind
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © monsit jangariyawong, 123RF.com
security services daemon (SSSD) is used to join a domain. Cluttered Logfiles The primary Winbind process creates a separate child process for each logical AD domain that the service wants to access. Each
8%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
things: Long-term attack analysis: It's not enough these days for IT professionals to set up real-time alerts of short-term scans. We all know that hackers are spending weeks and months surveilling
8%
Pulumi multicloud orchestrator
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
If you are dealing with Pulumi for the first time, it is best to first familiarize yourself with its programming model. Here, three terms come to mind that need further clarification: the program
8%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
. Figure 11: Entering a Shodan key. Conclusion Automating each element of the pen test lifecycle is possible, of course. In many cases, the Discovery phase is the most time-consuming part of the pen

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice