Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • News (193)
  • Article (79)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 Next »

16%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
in the tenant configuration and searches for files in the root of each repository. Zuul looks first for a file named zuul.yaml or a directory named zuul.d and, if not found, .zuul.yaml or .zuul.d (with a leading
16%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
, but it does have version updates. To the surprise of owners, this can lead to older software variants suddenly failing with new Blu-ray media. On Linux Linux uses the libdvdcss program library to decrypt
16%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
or successful compromise. For this reason, the auditd package also insists that permissions are set to root:root after rotating logs, … which leads me to the next aspect of auditd to be considered
16%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
, the auditd package also insists that permissions are set to root:root after rotating logs, which leads me to the next aspect of auditd to be considered. Professionally, I deal with Docker and Kubernetes
16%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
applications. OWASP describes such attacks as resulting "… in data loss, corruption, or disclosure to unauthorized parties, loss of accountability, or denial of access. Injection can sometimes lead to complete
16%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Suslov, 123RF.com
manipulation, linear algebra, and the like. This setup leads to two-language problems [3]: Your program is now written in a mix of languages with incompatible paradigms; you need to manage the interface between
16%
Nothing works without a profile
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © abidal, 123RF.com
. Different users on a computer potentially lead to different GUIDs. If a Connection Group has (temporarily) been removed from one computer and then added again, this will also mean different GUIDs. Each
16%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
some useful new features. Zimbra is as financially strong as ever but is mainly represented in the US, which also leads to great continuity within the software. It is quite possible that Zimbra might
16%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
a login manager. Unfortunately, this mode change leads to ugly screen flicker as well as security issues. In contrast, the newly introduced Kernel Mode Setting (KMS) switches the operating system kernel
16%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
the cars efficiently, inevitably leading to traffic congestion. If many people try to access the WiFi network and communicate simultaneously, a temporary overload also occurs. The WiFi 6 standard, based

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice