Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1084)
  • Article (89)
  • News (8)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 119 Next »

23%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
of command-line tools for EC2. S3 [6] (Simple Storage Service) offers permanent storage independent of EC2 virtual machines being deployed and shut down. Specifically, we use S3 to store the code that gets
23%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
queries from insecure zones. Third is the Active Directory Federation Services (ADFS), a Security Assertion Markup Language (SAML) and OpenID Connect-compliant identity provider (IdP) for federated
23%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
host aggregator.example.com port 24224 Listing 3 Simple Aggregator Node @type forward port 24224 @type
23%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
23%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
Accounts: https://support.office.com/en-us/article/Configuration-of-General-and-Notification-Settings-6ad3a53f-470f-4f15-ad31-aca147385449
23%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
-server-ctl user-create jstanger James Stanger jstanger@company.com Cr8*p@sswrd*here -f /tmp/jstanger.key Now that you’ve created a certificate and a user, make sure that the PEM files are in the right place
23%
Live snapshots with Virtual Machine Manager
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Iryna Denysova, 123RF.com
] covers a whole range of snapshot parameters associated with virsh, including live backups. For example, if a virtual machine named RHEL6 is running under libvirt, you can type: virsh snapshot
23%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © 36clicks, 123RF.com
: At the command line, the Vagrant user can combine a running virtual machine with a new subdomain on Vagrantshare.com. Its development environment is subsequently accessible on the Internet (e.g., on http
23%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
. If you also want to manage tenants in your AWS account or use AWS resources via an API, click on your own username in the upper right-hand corner and switch to the AWS Security Credentials page [6
23%
Certificate security
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jennifer Huls, 123RF.com
, that the user is indeed connected with the correct web address and not with a spoofed website when connecting to a specific domain (e.g., www.linuxmagazine.com ). In the recent past, however, many spoofed

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 119 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice