Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1049)
  • Article (291)
  • News (148)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 150 Next »

18%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
permanently, interoperability between the two worlds is ensured [6]. Thanks to wsl.exe, you can launch individual Linux commands (path specifications must, of course, follow the conventions for Linux) directly
18%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
datacenter: "{{ Vv_datacent }}" 19 folder: "{{ Vv_folder_1 }}" 20 state: absent 21 when: vm_facts.instance is defined 22 23 - name: Deploy VM from Template file 24 vmware_deploy_ovf: 25
18%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
rules still apply. The attacker cannot open port 22 to the outside by deleting the corresponding Netfilter rule to gain access to the system by SSH. How security groups can be used in AWS is explained
18%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
. Accessed September 22, 2016: https://lwn.net/Articles/665602 Inline TLS performance: https://www.chelsio.com/wp-content/uploads/resources/t6-100g-inline-linux.pdf Kernel documentation: https
18%
Ceph object store innovations
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Max, fotolia.com
-source-based storage management. For some time, the openATTIC [6] beta branch has contained a plugin that can be used for basic Ceph cluster management, which is exactly the part of openATTIC in which SUSE
18%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
18%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
of check. Listing 4 Early Detection Job Level Jobs Avg.Time Avg.Files Avg.Bytes =================================================== job-1 I 32 02:40:51 343,351 351.6 GB
18%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
the recommendations in the RustDesk documentation and enabling and configuring the firewall: sudo ufw allow 22/tcp sudo ufw allow 21115:21119/tcp sudo ufw allow 21116/udp sudo ufw allow 8000/tcp sudo ufw enable
18%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
the configuration and only offer a key exchange via elliptic curves. Disabling the vulnerable compression is not an option in older versions of Apache. It was introduced for the 2.2 series in version 2
18%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
character increases the power, which results in an incredible number of possibilities for each additional character. For example, denounce-crush-explore has 22 characters. From the current state of the art

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice