Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (939)
  • Article (276)
  • News (124)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 135 Next »

16%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
protocol (RDP)-based access to desktop systems (Figure 6). Figure 6: Teleport enables authenticated access to virtual machines in the cloud if combined
16%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
, the resources are protected because the account cannot exercise its privileges. Protecting admin accounts is the job of Azure AD Privileged Identity Management (Figure 6). This service protects accounts in Azure
16%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
(Figure 6). Figure 6: The Helm Kubernetes package manager stores ready-to-run definitions of custom resources and custom controllers in the fleet manager
16%
The state of OpenStack in 2022
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by vadim kaipov on Unsplash
and offering a cornucopia of features. For Yoga, the developers have focused on bug and error hunting, expanding their internal testing program and eliminating various bugs. IPv4 and IPv6, distributed name
16%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
for Supercomputing Applications) [6]. These days, however, along with a little help from the documentation, of course, it's possible to pin down logfiles for the following applications and services for relatively easy
16%
Setting up the lightweight Lighttpd web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Brett Jordan on Unsplash
contain all the warnings and notices. Adding server.errorlog-use-syslog = "enable" would tell the web server to write these messages to the syslog. Finally, the additional line server.use-ipv6 = "enable
16%
The advantages of configuration management tools
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Galina Peshkova, 123RF.com
Consensus ZooKeeper of course needs an inherent cluster mode to manage the services within a cloud and on the hosts (Figure 6). This is part of the scope of service: Unlike Etcd or Consul, ZooKeeper relies
16%
PostgreSQL 9.5 – What's new; what's better?
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Sergey Nivens, 123RF.com
. In the results for the example in Listing 6, you can see the global totals for the various departments. However, not all of the lines from the CUBE results make sense in this example. The NULL, Berlin, NULL line
16%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
. Level 5 displays whether a file is changed; however, each processed file is listed in level 6: # rdiff-backup -v5 /etc/ /mnt/backup [...] Incrementing mirror file /mnt/backup Processing changed file X11
16%
Integrating FreeIPA with Active Directory
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © payphoto, 123RF.com
in corresponding external (non-POSIX) groups; then, you can nest them in POSIX groups, which you can ultimately use in your set of rules. Listing 6 shows how you can nest all domain users from the Windows domain

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 135 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice