Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (753)
  • Article (204)
  • News (34)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 Next »

16%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
then Create New Users ; name the user whatever you would like and click C reate (Figure 6). Figure 6: Creating a new user. Once the user is created, go
16%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
crush set osd.3 1.0 rack=unknownrack host=charlie This is followed by launching the OSD on Charlie by typing: service ceph start From now on, the Ceph cluster will include the new disk in its CRUSH
16%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
,10 Fierce , written by Rsnake, queries your DNS servers of the target and attempts to dump the SOA records: $ ./fierce.pl -dns  -wide -file output.txt Fierce is interesting to run in larger
16%
Persistent storage management for Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by CHUTTERSNAP on Unsplash
on a Ceph cluster (Luminous or higher, Kubernetes 1.6 or higher) and runs a distributed filesystem directly on the storage cluster. Rook provides interfaces for scheduling, life cycle and resource management
16%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
now easily and securely access your AWS resources with MFA enabled. Gemalto offers two supported devices. The Ezio Time-based 6-Digit Token
16%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
environments. According to a survey by SUSE [1], more than 60 percent of companies whose IT budgets exceed EUR10 million per year have cloud-native applications, whereas cloud-native is a distant also-ran among
16%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
.env.GITHUB_API_TOKEN 06 07 var port = process.env.PORT || 5000 08 09 app.get('/', function (req, res) { 10 // Implement GitHub API call 11 }) 12 13 app.listen(port, function () { 14 console.log('App listening on port
16%
A smoke-jumping admin's best friend
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Thomas Detert, Fotolia.com
replacement for top written in Node.js with scrolling charts at the top (CPU usage) and the bottom left (memory usage). A good YouTube video [6] presents vtop. iptraf Provides network
16%
Five Kubernetes alternatives
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © alphaspirit, 123RF.com
feature is missing in Kubernetes. Performance and Stability Both Kubernetes and Docker Swarm claim to scale far beyond the limits of what is usually required. In the case of Kubernetes 1.6, the solution
16%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
for use on its own social platform. In fact, Meta is behind a number of products that can be found in other projects. RocksDB [6] is an excellent example. The company almost modestly describes Rocks

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice