Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 99 Next »

15%
Setting up the lightweight Lighttpd web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Brett Jordan on Unsplash
["remoteip"] Remote IP or remote network; only works with IPv4 $SERVER["socket"] Socket; only works with the == operator; additionally, the value must have the format :. Instead
15%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
Proxy: https://traefik.io/traefik Traefik Mesh: https://traefik.io/traefik-mesh Babcock, Nick. "Monitoring remote sites with Traefik and Prometheus": https://nickb.dev/blog/monitoring-remote-sites-with-traefik-and-prometheus
15%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
then takes on the tasks of sending a configurable list of topics to remote brokers and receiving lists from remote brokers to distribute to local clients. Without TLS support, the clients are only exposed
15%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
take a detour via the Remote Desktop Protocol (RDP) on top of Linux's own X Window System (X11) and provide a script that you can download and execute in the Kali shell with the commands: wget https
15%
Monitor and optimize Fibre Channel SAN performance
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 3dkombinat, 123RF.com
sent, the buffer credit is reduced by a value of one, and for each data packet confirmed by the other party, the value increases by one. The remote station sends a receive ready (R_RDY) message
15%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
.cfg in the configuration directory, the [ansible defaults] section then needs to be extended to include the remote_user = root entry. This ensures that Ansible actually uses the root account. DebOps uses the ansible
15%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
, the [ansible defaults] section then needs to be extended to include the remote_user = root entry. This ensures that Ansible actually uses the root account. All hosts in the Ansible inventory layout used by Deb
15%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
.groovy.d script as inline code to YAML. For the sake of readability, you can move this snippet to a separate file (e.g., GerritTriggerConfigurator.groovy) and run it locally (with a file predicate) or remotely (e
15%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
, without using the guest operating system. It must also be able to create a new instance with a local image or template file. A remote template file can also be used, although it introduces a single point
15%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
of devices, services, and tools used today, it's easy for attackers to enter networks in many different ways. Ransomware, botnets, malware, and remote control tools are readily available. Social engineering

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice