Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (505)
  • Article (164)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 72 Next »

15%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
location / { root /usr/share/nginx/html; index index.html index.htm; http2_push /style.css; http2_push /logo.png; } Many Small Files vs. One Big File Over the years, HTTP/1.1 has shown
15%
Setting up Google Apps for Work
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Galina Peshkova, 123RF.com
's source code or copying an HTML file into the domain website's root directory. You might already be familiar with this type of check from setting up Google Analytics. If you only use the Internet domain
15%
New container solutions for Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Scott Griessel, 123RF.com
easily be a Trojan running with root privileges. Moreover, Docker has moved so far away from its original goals that it has become virtually unusable in CoreOS. Rocket to the Rescue Rocket is the attempt
15%
Enterprise job scheduling with schedulix
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © homestudio, 123RF.com
) is not a point-and-click task; however, aided by the complete documentation, it is well within the capabilities of any admin. The system does not require root privileges for the install or for operations on any
15%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
with the afick.pl -c -i command. On Linux you have to introduce the command with sudo for root privileges (Figure 1). To run it under Windows, open a command prompt with administrator rights, switch
15%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
. Doing so then lets you use Kubernetes tools without being root. Ideally, you would want to carry out this step immediately. As a Kubernetes admin, you cannot avoid the network. Although not nearly
15%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
OS and uses its default Anaconda installer, which is fairly intuitive. Just make sure that Rockstor picks up the correct disk for installation, and remember to set a strong root password. First Boot After
15%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
a hierarchy. The DNS root servers have provided support for DNSSEC and corresponding keys since 2010. They use them to sign the keys, which in turn are used to sign keys for the top-level domains. The key
15%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
random MAC addresses and sends them out to the interface. Listing 1 Generating random MAC addresses root@kali:~# macof -e eth1 e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0
15%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
on a Linux machine (it's theoretically possible with Windows but is untested!), you will need to change into the root directory of the downloaded Git repository and type the command: vagrant up

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 72 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice