Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (351)
  • Article (81)
  • News (35)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 47 Next »

56%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
can take place. Microsoft calls this continuous access evaluation [3], and the technology is already integrated into Exchange, Teams, and SharePoint and will be offered to other manufacturers ... 2022
56%
Management improvements, memory scaling, and EOL for FileStore
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Yannic Läderach on Unsplash
. Drilled Out Automation Although some might turn their noses up at Ceph-Mgr and its cohort cephadm (Figure 3), others are happy to use the tool. Both positions are justified. On the one hand, you need ... 2022
56%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
in practice, because Rancher comes with its own Kubernetes core distribution in tow in the form of K3s, which provides all the features you need. In this article, I guide you through the implementation ... 2022
56%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
arguments of each syscall are required. The solution to this task was inspired by the ministrace parsing script by nelhage [9]. The script first searches for C source files in the fs, include, ipc, kernel, mm ... 2022
56%
Manage guest accounts in Azure Active Directory
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jon Tyson on Unsplash
in the usual way with Postman or Graph Explorer [2], which let you explore the API structure. A more detailed description by Microsoft of the cross-tenant access settings API is available online [3]. All ... 2022
56%
Rolling back from Windows 11 to Windows 10
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by cdd20 on Unsplash
provides ISO files free of charge [3]. After loading the ISO file, you will see the Extended Windows 11 Installation (no TPM/no Secure Boot) option in the Device Properties section. After selecting ... 2022
56%
SystemRescue 9.04 (Live)
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
, a USB stick [3], or a network by PXE protocol [4]. The kernel has been updated to v5.15.58, a long-term support release. The project was rebased on Arch Linux in v6, and system rescue modules (SRMs) [5 ... SystemRescue 9.04 (Live) ... 2022
56%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
, as in this code fragment, which implements and calls a multiply function: package function multiply(a,b) = m { m := a*b } result1 = r { r := multiply(3,4) } result2 = r { r := multiply(3,9) } The Rego ... 2022
56%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
, this service is available through dealers and is called Certified Pre-Owned [3], and in the UK, Approved Used [4]. The basis of the application infrastructure for Porsche Informatik's solutions and services ... 2022
56%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
over appropriate sharing platforms or simply for direct download. Exchanging Information with MISP The MISP Threat Sharing Platform [3] is currently the tool of choice for processing threat ... 2022

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice