Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (987)
  • Article (300)
  • News (171)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 147 Next »

29%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
_default] 23 category = mac 24 pattern = 2001:db8:1::$mac$ 25 26 [address_special] 27 category = mac 28 pattern = 2001:db8::$mac$ 29 dns_update = yes 30 dns_zone = lmtest 31 dns_rev_zone = 8.b.d.0.1.0.0.2.ip6
29%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
again a minute later anyway (QoS 0 is fine). Users might want to transmit the position of a mobile device with a bit more reliability (QoS 1 or 2), although the network traffic and costs rise, too
29%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
: Python 2 version 2.6, along with the developer packages (for Ubuntu in the python-dev package) librsync version 0.9.6 along with developer files (for Ubuntu in the packages librsync1 and librsync
29%
Spam protection using SpamAssassin
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
the filtered mail but can also access the rejected mail if required. SpamAssassin filters email in two phases: Phase 1 detects spam and phase 2 processes the email classified as spam. The SpamAssassin spam
29%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
is the registry – the storage space for Docker images – which did not even have a mechanism for authentication. Later, the image format was changed and Registry 2.0 (a.k.a., "Docker Distribution") was released
29%
Tools that extend Bash scripting
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Laschon Maximilian, 123RF.com
tput cup 5 17 # Set reverse mode tput rev echo "M-A-I-N M-E-N_U" tput sgr0 # Write first line of menu tput cup 7 15 echo "1. User" # Write second line of menu tput cup 8 15 echo "2. Service" # Get
29%
Migrating to Azure Monitor Agent
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
or in the context of Application Insights. Pricing is set by region [1], but if you want to store the data for a longer period of time, the costs are considerable – currently EUR0.13/GB per month in Germany or $0.10-$0
29%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
.yml Listing 2 Jinja2 Template for Router Mode Proxy location /{{ app_name }}/ { rewrite ^([^\?#]*/)([^\?#\./]+)([\?#].*)?$ $1$2/$3 permanent; proxy_pass http://127.0.0.1:{{ app
29%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
young project that was forked from Nagios [2] when development of the popular open source network monitor stagnated. Icinga delivers improved database connectors (for MySQL, Oracle, and Postgre
29%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
. The platform also comes with secure email communication that supports OAuth 2.0 for POP3 and IMAP email protocols to enable modern and secure authentication for the retrieval of email from services

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice