Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1014)
  • Article (317)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 155 Next »

9%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
interface, which for a local installation is http://127.0.0.1:8338 with default access credentials admin: changeme! Initial Configuration Steps The Maltrail environment is configured in the maltrail
9%
CloudStack's Chip Childers
29.10.2013
Home »  Articles  » 
 
earlier this year. What better time to check in with CloudStack VP Chip Childers on the state of the project and the path ahead? Chip served as release manager for the CloudStack 4.0.0 and 4.1.0 releases
9%
Chive
17.04.2012
Home »  Articles  » 
 
to appreciate the state-of-the-art Web 2.0 environment for developing and managing SQL statements and databases. A more grateful audience, however, are administrators of CMS, CRM, and groupware systems whose SQL
9%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
of hardware architecture. As for your cloud-native needs, version 8.3 includes updated container images for Buildah and Skopeo, as well as Podman 2.0. With the Podman 2.0 release, developers can work
9%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
to encrypt data that is transmitted across a network between a client application and an instance of SQL Server. SQL Server on Linux supports TLS protocols 1.2, 1.1, and 1.0. Machine Learning Services
9%
Configuring complex environments
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Austin Neill on Unsplash
the starwars.yaml file, use: yq eval ".publication-year[]" starwars.yaml If you only want to know when the first movie was released, put an index on the first element of the list: yq eval ".publication-year[0
9%
Analysis tour with Binary Ninja
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Igor Kovalchuk, 123RF.com
the following code admin.c: #include int main(int argc, char **argv) { printf("Hello World!"); return 0; } You can compile the source code with: gcc -O0 admin.c -o admin The -O0 entry switches off
9%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
ID Connect or the somewhat older SAML (security assertion markup language). If you have the choice, the Keycloak developers recommend OpenID Connect, which is an extension of OAuth 2.0 and offers JSON web
9%
CloudStack Up Close
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
served as release manager for the CloudStack 4.0.0 and 4.1.0 releases. He is a principal engineer in the Cloud Engineering organization at SunGard Availability Services, where he is responsible
9%
Redfish standard as a replacement for IPMI Chassis Management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © isselee, 123RF.com
developed by the Scalable Platforms Management Forum (SPMF) of the Distributed Management Task Force (DMTF). Version 1.0 of the standards was released in August 2015, followed by version 1.0.2 in December

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice