Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1077)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 146 Next »

24%
Scalable mail storage with Dovecot and Amazon S3
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
cases, mean significant hardware discounts in the enterprise, because it removes the need for SAN storage, so off-the-shelf hardware will do. Companies should certainly take such considerations
24%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
into all Kubernetes processes, as is the case with classic volumes and containers. Rook thus promises admins a quick and simple solution for a vitally important problem – reason enough to take a closer look
24%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
to the browser. .NET Core is based on a different architecture. Instead of being integrated into a web server as a kind of extension, as is the case with PHP or classic ASP, every web application under .NET Core
24%
Creating a private Docker registry
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Dayne Topkin on Unsplash
or the machine reboots, the container will always restart. Finally, you are giving it a name (i.e., registry in this case) that you can reference in scripts and use from other containers. You could pay
24%
Container microdistributions k3OS and Flatcar
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Ian Holland, 123RF.com
(Figure 4) is so closely interconnected with and designed for K3s that it is hardly worthwhile taking a closer look at the system without being interested in K3s. In this case, you get a largely non
24%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
instances. In case of a successful attack, everyone is at risk. Figure 1: Simplified schematic structure of containers. The obvious countermeasure
24%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
server in Windows Admin Center, select the website whose settings you want to change. If the server settings are not displayed, your monitor's resolution is not high enough. In this case, it might
24%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
/kolla/files/overlays/ directory: one for itself and one on which the server is to be installed (node1 in this case). The most important parameters in the Bifrost configuration file (bifrost.yml, Listing 1) are enabled
24%
Zero-Ops Kubernetes with MicroK8s
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
an Ubuntu version, whether a desktop build or a server, to test MicroK8s. In my case, I had the latest Long Term Support (LTS) version, Ubuntu Server 20.04. Older LTS releases are equally suitable (i.e., 18
24%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
key. In most cases, such connections can be easily hijacked because the user usually accepts the fingerprint blindly without verification. The cause of this information leak is the order of algorithms

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice