Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (435)
  • Article (186)
  • News (50)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 Next »

32%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
and Service Manager) are used to deploy an operating system on a node. OSISM [3], the deployment and lifecycle management framework, installs and configures all the required OpenStack components on that node so
32%
Manage Windows AD with PowerShell
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Kelly Sikkema on Unsplash
accounts. You can simply disable accounts that are no longer needed: Get-ADUser -Identity svc_low_SQL3 | Disable-ADAccount This method also works with accounts belonging to external identities
32%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
for cluster functions) that can be implemented on either the RHVH mini-footprint or RHEL. The former version was less popular with RHV insiders up to and including version 3.6 because of the heavily restricted
32%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
32%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
Installing the Ops Agent :> agents_to_install.csv && echo '"projects/playground-gs/zones/europe-west3-c/instances/test-vm1","[{""type"":""ops-agent""}]"' > agents_to_install.csv && curl -sSO https://dl
32%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
and patterns in the log data and then generate alarms or events from the corresponding data for further processing by analysts. Security Onion comes with more than 500 of these Plays, which you can use as
32%
MinIO: Amazon S3 competition
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © zelfit, 123RF.com
The Amazon Simple Storage Service (S3) protocol has had astonishing development in recent years. Originally, Amazon regarded the tool merely as a means to store arbitrary files online ... MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks. ... MinIO: Amazon S3 competition
32%
Protecting the production environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Intricate Explorer on Unsplash
that Puppet cannot detect. A typical example in the Unix environment is the sequence for setting up a service. You have to (1) install the package, (2) adjust its configuration file, and (3) start
32%
Monitoring and service discovery with Consul
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Joshua Earle on Unsplash
service ensures that virtual setups expand and contract as needed; the provider markets the corresponding functionality under the name Auto Scaling [3]. However, it is practically impossible to use
32%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
+ (in Tools  | Cookie Manager+ ) to locate a cookie and see its details. Figure 6 shows an example of a JSESSION cookie (from a Fortune 500 firm) issued from the web server without a Secure flag

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice