Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 113 Next »

10%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
: Scaling systems from customer requests: Automating the process of provisioning virtualized servers so that they meet the needs of clients. This means automating a server instance so it can contain
10%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
in this ability to combine find with virtually any other *nix command (e.g., sort, unique, wc, sed). In *nix, you have more than one way to accomplish a task: Different commands can yield the same end result. Just
10%
News for Admins
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
 
is now reporting that two major artificial intelligence (AI)-powered virtual assistants, Amazon Echo and Google Home, are also affected by BlueBorne. "These new IoT voice-activated Personal Assistants
10%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
is included in the OpenSCAP daemon package, can schedule system scans so that they do not repeatedly need to be executed manually. OpenSCAP not only makes it easy to scan physical and virtual systems, but also
10%
VMware is hit by lawsuit contending GPL violation
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sean Gladwell, Fotolia.com
For nearly 10 years, VMware has been suspected of using GPL-licensed code with its ESX system, a hypervisor created by VMware to deploy and server virtual machines. Negotiations with VMware
10%
End of life for Windows Server 2003
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Antonella Grandoni, Fotolia.com
hardware, on virtual computers on Hyper-V in your datacenter, or in Azure. The result of the assistant shows that there is not usually a general solution for migrating legacy systems
10%
Logical Bombs for Fun and Benchmarking
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
piece of code is best not executed on your computer, as it will likely crash it. Following that advice, I used a virtual instance on Amazon EC2 to carry out the experiment. Because the terminal session
10%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
developed by Intel and relies on virtual machines to operate containers. For network configuration, CRI-O uses the Container Network Interface (CNI) [11]. Another tool for managing containers and images
10%
A REST API automation strategy for DevOps
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image by Alex Kotliarskyi on Unsplash
include testing, bug tracking, monitoring, and data virtualization. Other suppliers in this area are Puppet Enterprise, Ansible (by Red Hat), and SaltStack. Consistent infrastructure APIs and software
10%
Multifactor authentication with Google Authenticator
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © iofoto, Fotolia.com
) as per RFC 6238, which means that a password is only valid for a certain amount of time. Time-based passwords, then, are virtually worthless to an attacker. A variety of modules can integrate Google

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice