Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (666)
  • Article (152)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 92 Next »

12%
Ansible as an alternative to the Puppet configuration tool
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Jenzig, photocase.com
. In other words, Ansible does not use its own protocol, nor does it need client software (Figure 2). Administrators can even install the main Ansible host from another computer, such as their own laptops
12%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
an internal corporate network connected to Azure by ExpressRoute or a VPN, or with a point-to-point VPN connection from the laptop to the target network on which the VMs are located, gives you access to the VMs
12%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
and the Class B "size" standard test (a four times size increase going from one class to the next) was used on a laptop with 8GB of memory using two cores (OMP_NUM_THREADS=2). Initial tests showed
12%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
modules (HSMs) on Android devices, or Trusted Platform Modules on a laptop. The term "discoverable credential" is so called, because the client can determine a list of possible keys in the authenticator
12%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
.g., /var/log/auth.log  or /var/log/boot.log ) or performing other specific admin tasks – including debugging problems. Permissions The user account on my laptop allows me to write to but not read from syslog . You might
12%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
IO should be deployed behind a firewall, and access should be limited to specific IP addresses or networks. You can also implement an intrusion detection and prevention system (IDPS) to monitor network
12%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs, all of the data is encrypted. However, if you forget
12%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
Code folding Figure 6 shows Editra running on a Windows 10 laptop (testing the multiplatform capability). Figure 6: Editra 0.7.20 on Windows 10
12%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
: Ubuntu mount  Output for nfs $ mount -l | grep -i nfs nfsd on /proc/fs/nfsd type nfsd (rw,relatime) 192.168.4.100:/home/laytonjb/work_laptop_dir on /mnt/work_laptop_dir type nfs4 (\   rw,relatime,vers=4
12%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
to use a local Minikube installation on my laptop to generate a report. (Minikube is a sophisticated, localized, stripped-down Kubernetes build that is great for testing and lacks the complexities a cloud

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 92 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice