Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 185 Next »

13%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
] of the mean), the 95th percentile (+/-2SD), and the 99.7th percentile (+/-3SD). Red Hat with Groundwork Now the question arises as to what you need to do to generate appropriate alerts from your metrics data
13%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
common wordage: response. Currently, the two most popular frameworks for IT security – National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) and MITRE D3FEND – address central
13%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
public wireless local-area networks (WLANs) by VPN over Internet Control Message Protocol (ICMP) and VPN over DNS Ethernet bridging and Layer 3 over VPN Logging and firewalling in the VPN tunnel
13%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
[3] free of charge (Figure 1). The client can be used for both development and backup repositories. Git Extensions [4] offers a somewhat older, technically overloaded look and feel (Figure 2
13%
Set up subdomains with Apache and Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Saniphoto, Fotolia.com
89.221.14.204... Connected to www.wintermeyer.de. Escape character is '^]'. GET / HTTP/1.1 HOST: www.wintermeyer.de HTTP/1.1 301 Moved Permanently Server: nginx/1.10.3 Date: Fri, 27 Nov 2020 14
13%
What's new in PostgreSQL 9.4
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
to the shell. Improvements for Materialized Views The basic functionality for materialized views was introduced in version 9.3 of PostgreSQL. The REFRESH MATERIALIZED VIEW command has now been improved
13%
Ansible as an alternative to the Puppet configuration tool
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Jenzig, photocase.com
to Ansible [3]. The Ansible configuration tool promises automation with a learning curve that is much shorter than Puppet's – and without compromising quality. Puppet Even back in the old days, when every
13%
Container IDE with cloud connection
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Christin Hume on Unsplash
, Gitpod does not want to reinvent the wheel. GitHub [3] is required as the version control system, and GitLab support [4] is a work in progress. The company behind Gitpod offers three price models: Open
13%
Managing containers with Podman
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © sandrobrezger, photocase.com
-build help page. The newly created image is then located in the local container storage repository. As Listing 3 shows, you can now use it to create an Nmap container. Listing 3 Creating an Nmap
13%
Regular expressions and metacharacters in PowerShell
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by JJ Ying on Unsplash.com
** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** t to check the $matches variable. Letters and Numbers The regular expressions in PowerShell use character classes, such as those that are also available in Microsoft .NET Framework 3.5. If you want to use

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 185 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice