Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 34 Next »

33%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
container. The basic setup simply routes the API management port of the cluster to the host system. With a few additional port-mapping rules, Kind also sends application data to an application pod within
32%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
. If you create a rule that prohibits Excel files with macros, the attackers switch to PDF files with JavaScript or HTML files with an encapsulated script. OneNote files containing Excel files with macros
32%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
/release/ A First Check I'll take a look at a simple check in practice, first with Checkmk and then in solo mode. You can find the corresponding rule in Checkmk under Setup | Services | HTTP, TCP, email … ; then
32%
Real-time monitoring with Graphite
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkov, 123RF.com
for CentOS 8.1 or higher. Configuration The Carbon module is the heart of the Graphite environment. It is controlled through various configuration files that reside in the /opt/graphite/conf/ directory
32%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Lookup Output START RequestId: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Version: $LATEST ('www.devsecops.cc', [], [' 138.68.149.181' ]) END RequestId: 4e90b424-95d9-4453-a2f4-8f5259f5f263 REPORT Request
32%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
and test the Unbound server. Add some iptables rules and control stuff and update precautions (for Docker) Be happy and drink coffee Building the Docker Layer The first step is to install Docker
32%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
would be taken up by the npm packages (about 75), and although that's not a large amount of disk space, it is still lots of little packages with many lines of potentially insecure code. My rule of thumb
32%
Automated compliance testing with InSpec
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Gunnar Pippel, 123RF
claim for their customers. However, corporations often need to implement compliance rules for certification that are contrary to existing business practices. To keep the promises made to the certification
32%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
. The software for this is available from the Kubernetes Cluster Federation project (KubeFed) [1]. Installation In the following example, I assume you already operate a Kubernetes (K8s) cluster. The example uses
32%
Cluster-Aware Updating for Windows Server 2012 R2
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © bahri altay, 123RF.com
, such as cluster-cau. However, you can use any name. The computer object is connected to the cluster later. Firewall Settings You also need to create an inbound firewall rule on all cluster nodes that are supposed

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice