Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 134 Next »

25%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
in the python-cryptopp package) Also, under certain circumstances, you might need other libraries for accessing cloud services. If you want Duplicity to store your backups on Amazon S3, you will need Boto
25%
Setting up and managing IPv6 on Windows Server 2016
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Photo by mathyas kurmann Unsplash.com
must be specified in days, hours, minutes, and seconds (e.g., 1d2h3m4s. By default, the lifetime is infinite. preferredlifetime: The period over which the address is preferred. It must be specified
25%
Exploring Apache CloudStack
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Utemov, fotolia.com
the creation of new types of allocators for the selection of storage and hosts. CloudStack can translate Amazon Web Services (AWS) EC2 and S3 API calls to native CloudStack API calls so that users can continue
25%
Apache 2.4 with mod_lua
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Tom Grundy, 123RF.com
, libraries, and standards that aimed to give developers the ability to produce complete web applications simply in Lua. One of the results was Xavante [3], a web server written in Lua. The Kepler project has
25%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
for changed files from the command line). Listing 1 Configuration File 01 { 02 "version": "3.0.0", 03 "watched": [ 04 { 05 "path": "/opt/repos", 06 "triggers": [] 07 } 08
25%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
data. End-to-end encryption is made possible by the use of protocols such as HTTPS, POP3S, or IMAP4S. Managed switches also offer the option of preventing such attacks, although the security function
25%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
applications that synchronize with cloud storage such as Amazon S3 and Dropbox. Table 2 Software Features Basic Data QNAP Synology Thecus Netgear Encryption
25%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
or failing. To see Monitoror yourself in action, use a terminal command to create a Docker network for test container(s): docker network create statuspage-demo Next, create the monitoror_stack.yml and config
25%
Writing SELinux modules
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Amy Walters, 123RF.com
--allow -s certmonger_t -t pegasus_conf_t Found 1 semantic av rules: allow certmonger_t pegasus_conf_t : file { ioctl read getattr lock open } ; What actually happens in the background is this
25%
Nested Kubernetes with Loft
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Andrea Davis on Unsplash
or roll out pods land. Part of the management center is Loft's own Kubernetes API instance. Users who send commands to a Kubernetes (K8s) instance managed by Loft do not talk directly to the K8s target

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice