Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (640)
  • Article (140)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 80 Next »

9%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
contributorGalleryRole 11 ] 12 } 13 14 resource networkConnection 'Microsoft.DevCenter/networkConnections@2024-02-01' = { 15 name: networkConnectionName .. .. } 16 17 resource attachedNetworks 'Microsoft
9%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
as a regular client to gain access to the data. Libvirt 0.9.12 or later can handle CephX, but the setup is not very intuitive. The following example is based on the assumption that a user named libvirt exists
9%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
an imminent failure. The lm_sensors tool [5] lets you monitor the fan and temperature. With just a little scripting, you can even create a heat map of the cluster to identify hotspots.  The smartmontools [6
9%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
 bytes Disklabel type: gpt Disk identifier: DD46F2B6-9DDE-4810-AA43-905AB60C656D   Device           Start        End   Sectors   Size Type /dev/nvme0n1p1    2048    1050623   1048576   512M EFI System /dev
9%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
. Magic?! To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command: $ aws iam create-policy-version --policy-arn arn
9%
Protecting the production environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Intricate Explorer on Unsplash
ensure => installed, 10 before => File[$config_file], 11 } 12 file { $config_file: 13 ensure => file, 14 content => template('apache/httpd.conf'), 15 notify => Service[$service_name], 16 } 17
9%
Simple OpenStack deployment with Kickstack
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Mechanik, Fotolia.com
is tailored to work closely with Red Hat's own OpenStack distribution, RDO [2]. Kickstack, in turn, is more concerned with the classic Ubuntu environment running Ubuntu LTS version 12.04. Until one of the two
9%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
Standard Filesystems Distribution Filesystem Debian (from v7.0 wheezy) ext4 Ubuntu (from v9.04) ext4 Fedora (from v22) XFS SLES (from v12
9%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
of Ubuntu, 10.04 (Lucid Lynx), which comes with Postfix 2.7 and Dovecot 1.2. In the following example, both components should be installed and functional, and the individual user accounts should come from
9%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
for internal communication in the node and one for communication with the applications. The following example uses CentOS 6.2 with the newest updates. At first, the installer should make certain that all

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice