Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 69 70 71 72 73 74 75 76 77 Next »

7%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
name/NetBIOS name (WIN-NJKFH7RKUAQ) The computer's workgroup That it is running Microsoft Networking/Server Message Blocks (SMB) From a security analyst's perspective, Figure 3 shows what
7%
Domain-driven design and agile development
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © omnimages, 123RF.com
a weekly live-stream on the topic of software architecture [7]. His technological focus is on modern architecture and development approaches such as continuous delivery, DevOps, and microservices.
7%
Credential management with HashiCorp Vault
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
. Figure 3: The process of an SSH login with Vault with, in this example, an OTP. For example, the setup on CentOS is quite easily managed. To verify the login data, you need a special pluggable
7%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
run multiple pods, each with its own MariaDB container, without any of them blocking the host's port on 3306. Within the pod, Ansible then rolls out the required containers with matching configurations
7%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
with your tenant (Figure 3). Although this procedure might sound redundant, it is set up for your privacy. If the request is accepted, the partner can then be found as an external identity in the directory
7%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
a range of hosts on the command line: $ pdsh -w host[1-11] uname -r $ pdsh -w host[1-4,8-11] uname -r In the first case, pdsh expands the host range to host1 , host2 , host3 , etc., through host11
7%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
. Among the parallel shells available, many are written in Python, which has become a very popular DevOps tool. Some of the tools are perhaps not as appropriate or useful for HPC but may be good for other
7%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
that can be hijacked by attackers on the web is not a good thing. Unfortunately, precisely this kind of attack has been extensively documented in the operations security (OpSec) scene. Often the companies
7%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
"SetAllowTSConnections" -Arguments @{AllowTSConnections=1;ModifyFirewallException=1} The command also sets up the required firewall rules to prevent Windows firewall blocking access. Group Policies
7%
Interoperability across clouds
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © alenavlad, 123RF.com
, so developers and administrators can gain some initial experience. Commissioning ARIA TOSCA The TOSCA implementation is based on Python and requires a Python 2.6 or 2.7 interpreter; version 3

« Previous 1 ... 69 70 71 72 73 74 75 76 77 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice