Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: ▶tippo365.com▶fortune gets how to win jon▶tippo365.com▶fortune gets how to win jackpotzi6 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 95 Next »

6%
Designate provides DNS as a Service in OpenStack
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Gabriele Maccaroni, 123RF.com
.g., www.example.com ). To that end, a corresponding A record (or AAAA [quad-A] record for IPv6) must be stored for a domain, and a corresponding PTR record (which refers to the A record) must be created
6%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
6%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
traffic-scrubbing services to catch upstream traffic for mitigating denial-of-service attacks. Equally, honeypots can be used to draw attackers in, so you get a flavor of the attacks that your production
6%
Scalable mail storage with Dovecot and Amazon S3
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
://Accesskey:Secret@\ Bucket-Name.s3.amazonaws.com/ } Figure 2: The Dovecot website provides a PDF file that describes how to set up the enterprise repository and the S3
6%
OpenShift by Red Hat continues to evolve
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © ktsdesign, 123RF.com
Kubernetes: https://kubernetes.io Docker: https://www.Docker.com One-click installation: https://docs.openshift.org/latest/getting_started/administrators.html#getting-started-administrators Pacemaker
6%
Putting an Active Directory domain controller in the Azure cloud
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sergey Nivens, 123RF.com
resources and act as a backup for local domain controllers (DCs). This article shows how to get started with adding a domain controller to your Azure configuration. Confusion with Portals Azure offers two
6%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
. Listing 1 kube-system Namespace Pods $ kubectl get pods -n kube-system NAME READY STATUS RESTARTS AGE coredns-5644d7b6d9-7n5qq 1/1 Running 1
6%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
network. The price of this power is knowing how computer networks operate; you don't need to be an engineer, but you do need to know more than the basics. Infos MikroTik: https://mikrotik.com
6%
Platform Games on Heroku
12.10.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
, and all that junk. Heroku started off hosting just Rails, but now it also hosts Java and Node.js. To get started, you sign up on their site and simply – as is always the way with anything Ruby
6%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
.1.3 Running hypervisor: QEMU 1.6.1 If access works, a few lines of Python are all you need to retrieve the desired information (Listing 2). The hypervisor hosts are defined in the hv array. In the following

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice