Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 0mb 2010 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (139)
  • Article (14)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 16 Next »

74%
Monitor your network
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Endrille, Fotolia
of the virtual network in your network router's configuration. For this tutorial, I'll use 192.168.0.11 as the IP address of the Pandora FMS server. Once you've earmarked the IP address for the server, you can ... 2020
74%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
-Forwarded-Proto" expr=%{REQUEST_SCHEME} ProxyPreserveHost On ProxyPass / http://127.0.0.1:4711/ ProxyPassReverse / http://127.0.0.1:4711/ ServerName www.example.com Server ... 2020
74%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
: profile title: InSpec profile to check /etc/motd maintainer: Martin Gerhard Loschwitz copyright: Hutchison Drei Austria GmbH copyright_email: martin.loschwitz@drei.com license: Apache-2.0 summary: Tests ... 2020
74%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
Kubernetes cluster. Kubeadm will install this shortly. On the node that you have selected as the Control Plane, the following command sets up the required components: # kubeadm init --pod-network-cidr=10.244.0.0 ... 2020
74%
Transparent SIP communication with NAT
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © studiom1, 123RF.com
from the internal to the public IP port address depends on the target IP address of the packet to be transmitted. For example, if a client with the address pair 10.0.0.1:8000 is transmitting to external ... 2020
74%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
similarity value of 1.0 to the two rascals. Of course, this is not yet hard evidence of unfair practices, but the result at least shows where you could drill down further to reveal more evidence ... 2020
74%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
','josh').outE('created').inV().values('name').path() ==>[v[4],e[10][4-created->5],v[5],ripple] ==>[v[4],e[11][4-created->3],v[3],lop] gremlin> g.V().outE('created').has('weight', 1.0).inV().values('name') ==>ripple gremlin> g ... 2020
74%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
-factor authentication are often not used because of their complexity. For this reason, Microsoft decided as early as 2018 to switch off basic authentication for EWS at Exchange Online as of October 2020. In 2019 ... 2020
74%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
kopano-server-packages # exit Listing 2 Community Kopano on Ubuntu 18.04 $ wget https://download.kopano.io/community/core%3A/core-10.0.6.349.8669778-Ubuntu_18.04-amd64.tar.gz $ tar xfz ... 2020
74%
News for Admins
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
 
-and-new-user-interface-arrive-with-nextcloud-desktop-client-3-0/). Three Major Threats to Linux Discovered In less than a week, it has been reported that Linux has been found to be vulnerable to three different attacks. This should come as no surprise, given ... 2020

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice