Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente" ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (934)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 133 Next »

15%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
6E5F05A1B2C960C41655E3 2B15CBE Considering the aforementioned CA vulnerabilities, anyone who would like to switch to self-signed certificates will receive support from DANE SMTP once again
15%
Booting Windows from a compressed image
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © ximagination, 123RF.com
. However you create your image file, you should now create a mount directory and mount the image (lines 3 and 4; Figure 1). Additionally, you make the recovery boot image (winre.wim) visible in line 6
15%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
on other Linux systems such as CentOS or Fedora. First, you need to grab the JBoss Data Virtualization software [2]. Then, unpack the JAR archive using java -jar jboss-dv-installer-6.0.0.GA-redhat-4.jar
15%
Quick and easy SaaS provisioning for OpenLDAP
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © scyther5, 123RF.com
requires it. Finally, the all-important group settings allow you to assign individual apps per user (Figure 6). Figure 6: Adding the group search details
15%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
you would navigate to the appropriate directory (e.g., windows/x64/meterpreter/reverse_tcp). Once there, you can set the IP addresses and ports (Figure 6) and simply listen for a connection back from
15%
Migrate your workloads to the cloud
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Peapop, Fotolia.com
-shared-storage-amazon-aws-sanless-cluster/ Overview of IPv6 for Azure load balancer: https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-ipv6-overview The Author
15%
11 Tricks for Windows servers
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kati Molin, Fotolia
like Storage Replica or Storage Spaces Direct. Of course, you will need a valid product key for the change. 6. Starting Safe Mode in Automatic Repair Interrupting the Windows startup process two
15%
Hardware suitable for cloud environments
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Orlando Rosu, 123RF.com
. Additionally, you need a 2U server for about $6,500 (EUR6,000). Roughly calculated, a Ceph server like this would cost about $13K (EUR10K), with an entire cluster for around $100K (EUR80K). The same cluster
15%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
of Kata Containers go back further than 2017, and the project brings together efforts from Intel and the Hyper.sh secure container hosting service: Clear Containers [6] or runV [7]. Kata Containers use
15%
Persistent storage management for Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by CHUTTERSNAP on Unsplash
on a Ceph cluster (Luminous or higher, Kubernetes 1.6 or higher) and runs a distributed filesystem directly on the storage cluster. Rook provides interfaces for scheduling, life cycle and resource management

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice