Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (689)
  • Article (207)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 102 Next »

17%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
attached (Figure 12). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
17%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
, the Auth component first creates a valid X.509 certificate with restricted validity (usually 12 hours) and sends it back to the client. The second phase of establishing the connection then follows. Teleport
17%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
, you need to set a password for administrative access (admin account), which must be at least 12 characters. Afterward, you are taken to the Portainer interface, where you see a Quick Setup wizard
17%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Jack Hunter on Unsplash
benefits graphically intensive applications, but also those that require GPUs for machine learning (ML) or artificial intelligence (AI) use cases. Microsoft has ported the DirectX 12 interface to Linux
17%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
(msg.payload)) 07 08 mqtt = paho.Client() 09 mqtt.on_message = on_message 10 11 mqtt.connect("localhost", 1883, 60) 12 mqtt.subscribe("linux/+", 0) 13 14 mqtt.loop_forever() The client now connects
17%
PostgreSQL 9.5 – What's new; what's better?
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Sergey Nivens, 123RF.com
_expires) 10 WHERE (user_id, subscription_type) = (in_user_id, in_subscription_type); 11 EXIT upsert WHEN FOUND; 12 BEGIN 13 INSERT INTO subscriptions (user_id, subscription_type, started, expires
17%
New storage classes for Amazon S3
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © stillfix, 123RF.com
) ≥3 Glacier Deep Archive Data archiving for barely used data with a recovery time of 12 hours 99.999999999 99.99 (after restore) ≥3 RRS (no longer
17%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
MAXJPEwna184sRuU6QGYWnccTAyJhpzYQ+AsfK8eZVYS 12 iA2g8G24ZIvMrzOp6KQdx0XET6/QIO5xD7B0QH9YNXatVsXtzce+9Q9X 13 klmc78oKRKrVw969aEX91kjRXf6pjRXckJxXdXetxzuL6/E4bMKjQCGX 14 yJI20TGx Confirming the keys follows
17%
Proxmox virtualization manager
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image by Daniela Cuevas on Unsplash.com
cloud solutions, they still exist and are very successful. Red Hat Enterprise Virtualization (RHEV) enjoys a popularity similar to SUSE Linux Enterprise Server (SLES) 12, to which you can add extensions
17%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
these web-free applications a "digital environment" or "offline business data." A quote from the Analytics Academy, Lesson 1.2, says: "You can even use Google Analytics in really creative ways to collect

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 102 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice