Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (64)
  • Article (29)
  • Blog post (4)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

44%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
, as in this code fragment, which implements and calls a multiply function: package function multiply(a,b) = m { m := a*b } result1 = r { r := multiply(3,4) } result2 = r { r := multiply(3,9) } The Rego
44%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
by the SID converter. You have probably viewed the event log of a domain controller that revealed a problem with a user that had a SID of 123 et cetera , but who is this user? Of course, you have Power
44%
Securing containers with Anchore
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © loiic, Fotolia.com
-engine container's hash and using it to change the hash beginning ab48a in the following command, which came directly from the Anchore GitHub page [5], $ docker exec -t -i ab48a716916f curl -u admin: http
44%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
- name: Get facts for node 04 vmware_guest_facts: 05 hostname: "virtualhome.giantco.cxm" 06 username: "admin" 07 password: "pass123" 08 datacenter "losangelesctr" 09 name
44%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
the unwanted packets. In the case of flooding via NTP, you could, for example, enter Any as the source address for the filter and the IP address of the victim as the destination using a source port of 123
44%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
MySQL 9.0 Released The MySQL team has announced open source MySQL 9.0 (Innovation Release), along with the first update of the 8.4 LTS (8.4.1): https://dev.mysql.com/doc/relnotes/mysql/8.4/en ... In the news: MySQL 9.0 Released; NordVPN Launches File Checker Tool; Critical OpenSSH Vulnerability Affects Linux Systems; IT Pros See Shrinking Job-Related Benefits Despite Salary Increases; Top
44%
Tinkerbell bare metal deployment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by engin akyurt on Unsplash
the software was originally developed by Packet, a metal-as-a-service provider, which has since been taken over by data center provider Equinix. Packet's business model was very simple: Much like AWS or Azure ... Tools that handle bare metal deployment are few and far between, but the free Tinkerbell program tackles this problem with a modern architecture that comes from the metal-as-a-service scene, allowing
44%
Migrating to Azure Monitor Agent
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
on demand, either with a search (EUR0.007/GB or $0.007/GB of information scanned) or a restore (EUR0.128/GB per day; $0.123/GB per day), whereas queries have no extra charge during the regular retention phase
44%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
a Raspberry Pi 4 with 8GB of RAM and parallel RHEL 9 (pi8.mynet.ip) to use Nginx with subdirectory routing. The Ansible code ran on a Fedora 36 workstation, the alternative being a Windows subsystem for Linux
44%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
mean you need to shut down, migrate, and restart virtual machines. If you want to reduce the tedium of working with virtual machines, you could resort to an Infrastructure-as-a-Service (IaaS) cloud

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice