Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 185 Next »

13%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
, which Apt relies on to ensure that the packets come from a reliable source (line 2); add the package sources for Docker to the local list of package directories (line 3); and update the local package
13%
Configure Entra ID with PowerShell Desired State Configuration
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Tom Hermans on Unsplash
a key pair for the service principal, (2) create the service principal itself with its configuration, and (3) grant consent for the Graph authorizations. The example creates a service principal
13%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
the various MACsec encryption scenarios on a switch. The examples are based on Cisco Catalyst 9300 switches [2] [3] with IOS XE version 17.6 as the authenticator, a Windows endpoint with Cisco Secure Client
13%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
source products, such as OpenStack [1], openQRM [2], Eucalyptus [3], or Ganeti [4], each with its specific functionality and concepts. Because of the diversity of scenarios, most cloud stacks behave
13%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
will be followed this time, although test builds are now available online [2]. Jigsawing One core feature of Java 9 par excellence is the Java Platform Module System that became known as Project Jigsaw [3]. Thus
13%
Clustering with the Nutanix Community Edition
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Beau Runsten on Unsplash
. To create a bootable USB stick, you can use the USB installer of your choice (e.g., Rufus [3]). Now take the downloaded ce-2020.09.16.iso file and create a bootable USB CE installation stick with one
13%
Spotlight on the Kubernetes package manager, Helm
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Nick Fewings on Unsplash
. Where rpm or dpkg take the stage on conventional systems, Helm comes into play with K8s. Old Hand Helm has been around for a few years in the K8s universe. The current version 3 is quite different from
13%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
of the drives (more on that later). Smartmontools is compatible with all S.M.A.R.T. features and supports ATA/ATAPI/SATA-3 to -8 disks and SCSI disks and tape devices. It also supports the major Linux RAID cards
13%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
. Another way to think of data analytics is the combination of two concepts: ``data analysis'' and ``analytics.'' Data analysis [3] is very similar to data analytics, in that it is the process of massaging
13%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 185 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice