Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%2012%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (203)
  • News (35)
  • Article (15)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 26 Next »

95%
DNS name resolution with HTTPS
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by saeed karimi on Unsplash
2022
95%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
2022
95%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
into a Kali computer. Thanks to Win-KeX, Kali offers a full desktop interface on WSL  2 [7]. Additionally, Microsoft has released a preview of WSL  2 support for running Linux GUI applications [8 ... 2022
95%
Questions about the present and future of OpenStack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Julien DI MAJO on Unsplash
2022
95%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
downstream (e.g., in Excel). Advanced View 2.0 Like the standard Users and Computers console (dsa.msc), you can also use the various NetTools functions to display object properties. You are probably aware ... 2022
95%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
2022
95%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
-keygen -y private.key The keys generated are in the form of Base32-formatted X25519 identities (i.e., they are based on elliptic curves). In addition to Age's own format keys in version 1, Age also accepts ... 2022
95%
Container Angst
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Image © Jakarin Niamkiang, 123RF.com
2022
95%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
least – behind the times, if not actively blocking innovation. Anyone who hasn't learned the ideal architecture of a Kubernetes cluster by rote must have been asleep for the last 25 years. One ... 2022
95%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
analysis might miss. A great question is: Why does user X have a new version of an application? Normal log analysis would not care about this query, but perhaps the user needed a new version and could ... 2022

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice