Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 149 Next »

13%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
. They promise container application developers a central network interface in which the parts of an application talk. The required services (i.e., load balancing, filtering, discovery of existing services, etc
13%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
by the cluster controller to form a cluster. The cluster controller determines which virtual machine starts on which node; it manages the network to which virtual machines connect. Cloud Controller (CLC
13%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
attacks on filesystems and directories, changes to system files and configuration files, failed login attempts, and attempts to escalate privileges. The tool also detects changes to logfiles and network
13%
Simple, small-scale Kubernetes distributions for the edge
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © grafner, 123RF.com
the control plane to the usual three-node setup. Further cost-saving measures can be identified in the storage, network, and proxy realms. K3s relies on the Traefik reverse proxy for IP routing instead
13%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
, isolated access to your filesystems, and monitored network traffic. In the container context, these functions include Nspawnd and Portabled. When deployed correctly, they draw on features from
13%
TUI Tools for Containers
07.10.2024
Home »  HPC  »  Articles  » 
can see other metrics such as memory, disk, and network utilization, along with an enhanced process table that includes memory and CPU usage. Notice that the network information at lower left has
13%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
. Updates The vast majority of security advisories come with one common warning: Update your system! System updates are a necessity on today's networks, and a number of extensions to the update process [2
13%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
." Prevention and NIS2 Dennis-Kenji Kipker, Professor of IT Security Law at the Bremen University of Applied Sciences, points out that NIS2 [the successor to the 2016 European Network and Information Systems
13%
VMware Tools
15.10.2013
Home »  Articles  » 
of virtual memory (vRAM), speed of the network connection (bandwidth), and contract duration. Thus, the vCloud Hybrid Service Dedicated Cloud provides physically isolated and reserved computing resources
13%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
for the virtual machine, copies the image file for the virtual disk, and gives the network adapter a new, random MAC address. The remaining hardware components remain unchanged. After cloning, however, much manual

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice