Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (939)
  • Article (276)
  • News (124)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 135 Next »

16%
OpenStack Trove for users, sys admins, and database admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © cheskyw, 123RF.com
intervention by the user. The command: trove create lm-slave 1 --size 2 --slave_of ae427c76-eee3-11e6-802a-00215acd73e2 would add a slave node named lm-slave of flavor 1 to the database with the ID ae427c76
16%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
. Magic?! To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command: $ aws iam create-policy-version --policy-arn arn
16%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
-critical environments and support stricter security requirements. If you are looking to install Portainer with Docker on Linux, detailed documentation can be found on the project's website [6]. Usage After the install
16%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
of this series with Footloose for automation. To begin, grab the Footloose binary from the GitHub project site [6], if you haven't set it up already, and create the YAML file shown in Listing 1 in the directory
16%
Protecting the production environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Intricate Explorer on Unsplash
resources also belong to the parent class, unlike include, and is the only way to make sense of a dependency definition (e.g., for the apache class) [6]. Idempotency allows a declaration with class
16%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
happens transparently for the user, who has no contact at all with the tools. Otto is released under Mozilla Public License Version 2.0, and development is an open process on GitHub [6]. Otto has one
16%
Enterprise job scheduling with schedulix
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © homestudio, 123RF.com
, and Linux. The product discussed in this article, schedulix [6], is a free enterprise resource scheduling system targeting small to medium-sized enterprises, designed for Linux environments, and available
16%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
interface. They then forward the login to the cloud. Microsoft provides the free Client Access Policy Builder [6] so that these policies can be created and implemented as easily as possible. The Client
16%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
) version of awscli, so I used the faithful Pip package manager yet again to install my preferred version: $ pip install awscli If you get stuck, check out the AWS docs [6]. You might need to add awscli
16%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
as of yet [6]-[8]. The only path that remains, then, is to accept that a part of the memory changes while copying. With older Linux versions, this was quite simple, because dd could copy /dev/mem locally

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 135 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice