Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 98 Next »

8%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
such that an IT team then needs to take time out to expand a server's CPU or RAM resources (i.e., vertical scaling). The solution demonstrated in this article avoids vertical scaling headaches, instead allowing
8%
Logging with systemd
18.02.2014
Home »  Articles  » 
and no longer meets today’s requirements in a useful way. So, it’s time for a successor, which has actually existed for quite some time in the form of Upstart. Upstart is to a great extent downwardly compatible
8%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
expect from it. However, each hyperscaler uses different tools, some of which might be specific to a manufacturer, leading to gaps in the test suite. Moreover, the existing SSD error correction functions
8%
Regular expression security
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Jakub Jirsak, 123RF.com
, and the state machine accepts it. If further characters are read from the input, the machine proceeds to state 3 and does not accept the input. For each regular expression in your application, you can create
8%
Data center management with Ralph
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © ffzhang, 123RF.com
to the developers, this is still the best way to achieve near real-time synchronization of cloud assets. With OpenStack as an example to demonstrate the procedure, you need to go to Cloud | OpenStack and select
8%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
for the VMs running there. If the function is active, the cluster does not intervene for four minutes by default. If the failed host comes back up in this time, its VMs continue to run during this time
8%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
= 127.0.0.1/8 192.168.1.55 192.168.1.89 Save the jail.local file. You'll want to protect any exposed service port on your system. For this article, I'm going to protect SSHD. For each service
8%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
originally created by Facebook that, as its name suggests, is designed to query various details about the state of your machines. The osquery tool works across Linux, Windows, and macOS and exposes operating
8%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
password cracker version 0.7 or newer. Tsunami calls these components in several of its own actions; without the appropriate programs, those calls would go nowhere. Moreover, simulating a misconfigured
8%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
it's always possible to automate these processes (e.g., with anacron), in reality, ain't nobody got time for that. Your security posture begins by religiously applying software patches; however

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice