Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (970)
  • Article (282)
  • News (125)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 138 Next »

22%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
off unmanaged 6 docker0 ether routable configured 7 virbr0 ether no-carrier unmanaged The previously set up DNS stub resolver now uses the DNS
22%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i Figure 2: Getting all secrets from containers in the cluster. 6. Container breakouts: Attackers might exploit vulnerabilities
22%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
and the beginning of the frame. MAC addresses: 6 bytes for the MAC address of the target device, followed by 6 bytes for the MAC address of the source device. 802.1Q tag: 4 bytes with information about the VLAN
22%
News for Admins
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
 
kernel 5.13, support for a wide variety of hardware including x64-64, ARMv7, ARM64, POWER8, POWER9, IBM s390x (LinuxONE), and RISC-V, and software updates such as Qemu 6.0, libvirt 7.6, PHP 8.0.8, Apache 2
22%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
before the fingerprint encode the algorithm and hash method used [1]. Digits 1 to 4 on the left stand for (in ascending order) RSA, DSA, ECDSA, and Ed25519. No algorithm has been assigned for 5 yet, and 6
22%
Fixing Ceph performance problems
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kritiya Sumpun, 123RF.com
storage by splitting up these files and putting them back together again later. When the user uploads a file to RADOS, the client breaks it down into several 4MB objects before uploading, which RADOS
22%
Build operating system images on demand
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Nataliya Hora, 123RF.com
and needs 900MB of storage space (Figure 1). If you have fast Internet access on the system on which you call the fai-diskimage command, the process is also quick. It hardly takes a minute for the finished
22%
Storage cluster management with LINSTOR
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © sdecoret, 123RF.com
: resource-definition create --layer-list storage LocalData Now, add a single volume of 150MB to the resource definition named LocalData : volume definition create LocalData 150m Finally, on the cluster
22%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB
22%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
can manage the whole deployment and hardware configuration with PowerShell commands. For instance, you can create a new machine with the command: > new-vm -Name win8 -MemoryStartupBytes 512MB -Boot

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice