Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (82)
  • News (11)
  • Article (6)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10

35%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
://en.wikipedia.org/wiki/Format-preserving_encryption PostgreSQL Anonymizer 1.0: https://www.postgresql.org/about/news/postgresql-anonymizer-10-privacy-by-design-for-postgres-2452/ MongoDB data masking: https://www.mongodb.com/resources/products
35%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
the GPU resources it needs (Figure 9). Figure 9: Even though the jobs pytorch-t0 through pytorch-t5 have all been submitted to the cluster, Volcano doesn
35%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
properly. An existing backup script can be extended to include heartbeat in a curl command: curl --request POST --header 'Authorization: Key H0i_bj<...>' --header 'Content-type: application/json' --data
35%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
features only found their way into the software in AAP 2.0. Table 1 Ansible Automation Platform Objective To create, execute, and manage automation processes Manufacturer
35%
phpVirtualBox and RemoteBox compared
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Renjith-Krishnan, 123RF.com
version 2 since version 4.0. The latest version available at the time of writing, version 4.2, is probably newer than the packages provided by the repositories of most Linux distributions. The installation
35%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
_syslog => "local0"; You need to add one of the two lines to the Rexfile before the first task. A word of caution: In both cases, only the messages generated by Rex itself end up in the logfiles. The returned uptime
35%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
.g., A becomes 4, E becomes 3, O becomes 0, 1 becomes !, etc.), makes the password even more complicated and does not make it any easier to handle. For example, the Robbie Williams refrain Hell is gone and heaven
35%
Designing a secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
admin groups necessary, if you have not already done so. No normal user needs to be able to list administrators, highly privileged groups, and Tier 0 systems. Also, consider the permissions of the Admin
35%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
task customization that installs Wireshark into a dev box environment by WinGet package management: $schema: 1.0 tasks: - name: winget parameters: package: WiresharkFoundation.Wireshark run

« Previous 1 ... 3 4 5 6 7 8 9 10

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice