Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1077)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 146 Next »

24%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
– the attributes and properties of the users your application can access. In the standard case, all client scopes are assigned first. Other configuration of services and the need to access individual user attributes
24%
News for Admins
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
 
tremendous interest and support from both the community as well as many commercial vendors, many of whom have begun using AlmaLinux OS for some pretty amazing use cases." Aboutboul continues, "Our thriving
24%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
administrators use to safeguard containers are only slowly establishing themselves. In many cases, it is precisely the features that make Docker popular that also open up vulnerabilities (Figure 1
24%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
for the Juju orchestration tool, Open vSwitch 2.4.0, and the Ceph 0.94.3 "Hammer" distributed storage system. Ubuntu provides separate editions for various IT use cases, including Desktop and Server, as well
24%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
version to make working with them far easier in some cases. Setting Up Bridge Devices The systemd-networkd network manager can now handle a variety of different network devices; its feature set has been
24%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
. The injected layer needs this to notice an error, so it can then ask the Lambda function to stop running. When it comes to errors in the case of this Bash run time, you should therefore religiously send any
24%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
communications, mounting a disk volume, or even creating a directory, as needing some form of assistance and therefore validation from a host’s kernel. In many cases, a handling program like the all
24%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
_production`.* TO 'huginn'@'localhost'; exit When you type the password for the huginn user ( in this case), you should see an ERROR: 1049 Unknown database error. Otherwise, something has gone wrong creating
24%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
of assistance and therefore validation from a host's kernel. In many cases, a handling program like the all-pervasive glibc (GNU C Library) will invoke the syscall directly and not the underlying application
24%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
for the application. In most cases, the images are based on a specific Linux distribution and contain not only the run-time environment for the application itself, but also a lot of the dependencies, which means

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice