Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%2222%21490 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (196)
  • News (35)
  • Article (12)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 25 Next »

95%
DNS name resolution with HTTPS
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by saeed karimi on Unsplash
the question of trusting or mistrusting your own Internet provider; associations that provide protection against censorship [1] or offer data protection [2]; or large DNS providers such as Cloudflare [3], Google ... 2022
95%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
Socket Layer (SSL) VPN, the Layer 2 Tunneling Protocol (L2TP)/Internet Protocol Security (IPsec), OpenVPN, and Microsoft Secure Socket Tunneling Protocol (SSTP). SoftEther supports network address ... 2022
95%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
WSL blog, Microsoft provides more details on the role and history of the Pico processes [2]. In WSL  2, on the other hand, the source code of the Linux kernel is executed in a virtual machine, sized ... 2022
95%
Questions about the present and future of OpenStack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Julien DI MAJO on Unsplash
2022
95%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
on this problem. The monitoring functions range from health checks for a site to analyzing replication at the attribute level. The Attribute Replication function (Figure 2) lets you look into the details. To do ... 2022
95%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
too, you can view, modify, or download individual files on the web UI, if required. Git on Windows The Git homepage offers a setup for Git on Windows [2]. In addition to the plain vanilla command ... 2022
95%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
over a year ago. Alternatively, you can use the implementation in Rust, named Rage [2]. The Go version is well ahead in terms of performance, though, especially with large volumes of data. Age has ... 2022
95%
Container Angst
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Image © Jakarin Niamkiang, 123RF.com
2022
95%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
admins want to escape by deploying containers is actually a relic of the past (Figure 2). If you only use packages from the manufacturer, from properly maintained backport directories or (often) from ... 2022
95%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
, as well. The exact time of the event is needed to search across logs from other systems and devices to correlate all logs. Therefore, enabling the Network Time Protocol (NTP) [2] on all systems is critical ... 2022

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice