Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (67)
  • Article (9)
  • News (8)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

55%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
-oF target for Linux is used to publish the desired drives as an alternative to iSCSI (Figure 3). The provider even provides its own tool [1] to build a Linstor cluster quickly with a published NVMe-oF target
55%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
Factory (Figure 3) online; you can use it to create customized ISO images, PXE boot images, images for operation in the cloud, and images for various other purposes. Once again, the Talos "frugal first
55%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
, a decrease of 10%. 3% of respondents reported access to day care or day-care subsidies at their organizations, down from 4% last year. Only 39% of survey respondents said they were "satisfied
55%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
.msc for computer certificates. When you pass the thumbprint in to rdpsign.exe, make sure you type it without spaces, except at the beginning and end of the character string: rdpsign.exe /sha256 df3e3a36e67a45e8e4
55%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
on the configuration, it can be a development run or a proposed run (Figure 3). If so desired, a proposed run automatically cleans up its resources when done, to avoid expensive surprises caused by test setups left
55%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
. Modules and Prices The developers sell the device, which is made in China, from their online store [3]. The price for the basic device is $169 (EUR199). Purchasing a silicone case ($15, EUR18) is also
55%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
Diagnostic settings under the Monitoring section (Figures 2 and 3). Here, you add a new diagnostic setting, name it, choose the logs and metrics you want to collect, and specify the Log Analytics workspace
55%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that’s 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
55%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
both OpenSCAP-based rulesets for implementing compliance requirements and rulesets that were previously only available in the form of Red Hat Knowledgebase articles [3] (Figure 1
55%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
Linux VMs, providing more granular control. It's also important to audit and update NSG rules regularly (Figure 3) to ensure they remain aligned with your security policies and the evolving threat

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice