Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 99 Next »

15%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
@host to access their target system after logging in to the Teleport shell, commands for connecting to PostgreSQL could subsequently be executed with kubectl or psql. Teleport is even available for remote desktop
15%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
use it on remote machines, too. You will also want the front end to provide statistical information that helps you allocate system resources in a granular way. This information can help
15%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
" contain the specific commands and calls needed to check remote services for specific vulnerabilities. Accordingly, the Tsunami source code is broken down into several sections that comprise the main
15%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
, interesting application scenarios are conceivable in the environment of latency-critical communication such as VoIP or sequential database access. Remote access by VPN could open up another field of application
15%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
access to comprehensive life-cycle management features that let you reboot remotely, reinstall, and completely wipe computers. If you can, and want to, commit specifically to one manufacturer, Red Hat (Red
15%
MinIO: Amazon S3 competition
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © zelfit, 123RF.com
also be leveraged by the MinIO client. The client can do far more by emulating a kind of POSIX filesystem at the command line – but one that is remotely located in S3-compatible storage. The tool, mc
15%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
-V Support server feature on the Hyper-V hosts to be protected. This extends the functions of Hyper-V to include options for operating shielded VMs. You also need to install the Remote Server Administration
15%
New container solutions for Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Scott Griessel, 123RF.com
and managed from the outside using HTTP-based commands. Viewed in the light of day, LXD is thus a collection of tools, written in Go, that remotely controls LXC containers. Similarities to Rocket definitely
15%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
from the script. You just need to select the appropriate option for the scenario that you want to use. If you want to block all remote access to Office 365, you can specify IP address ranges from which
15%
Building a virtual NVMe drive
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © lassedesignen, 123RF
to a remote block device – specifically, an NVMe target. (2) The target will be the server exporting the NVMe device across the network and to the host server. A Linux 5.0 or later kernel is required on both

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice