Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 通讯录的微信怎么查-(⏭查询网站gpios.com⏮)-可以查手机通讯录吗-别人欠款如何查通讯录-催款人怎么查通讯录-(⏭查询网站gpios.com⏮)-如何查手机一年前的通讯录6Q ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1166)
  • Article (82)
  • News (13)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 127 Next »

73%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
to download it and open it in the app first; rather, you access the database in the cloud directly from the app. The KeePassDroid Android variant supports OneDrive and Google Drive, for example (Figure 4
73%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
domains and mapped across the five maturity levels. Practices applied at maturity levels 1 and 2 have been referenced from Federal Acquisition Regulation (FAR) 52.204-21 [4] for the basic safeguarding
73%
The advantages of configuration management tools
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Galina Peshkova, 123RF.com
of a Docker installation [4]. With the Armada tool, you can start Docker containers at will from CoreOS servers and running Etcd instances. In return, they read their necessary configuration from the Etcd
73%
New container solutions for Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Scott Griessel, 123RF.com
in their own project: Docker is much more than a container standard; it is a separate platform for container operations. Teaming up with OpenStack thus does not work very well, either (Figure 4
73%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
or exclude similar packets (Figure 4). Figure 4: Including and excluding requests to given hosts and IP addresses. The Spider tab allows
73%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
this target (Figure 4). Figure 4: Porter comes from Microsoft and is far more versatile than Duffle. Above all, it also supports other services. For Porter
73%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
valuable clues), corresponding volumes can be created on the command line: $ docker volume create --driver fuxi --name it-admin-test --opt size=1 --opt fstype=ext4 --opt multiattach=true --opt volume
73%
Make better use of Prometheus with  Grafana, Telegraf, and Alerta
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Valerie Elash on Unsplash
their Alerta tool an interface to let it talk to Prometheus Alertmanager. Alerta itself comprises several components. The most important from the admin's point of view is undoubtedly the web interface (Figure 4
73%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
certain similarities with Paxos or Raft. If this reminds you of Pacemaker [4], you're right: Paxos is used for consensus finding there, as well, and every Pacemaker instance is an extremely rudimentary key
73%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
a Raspberry Pi 4 with 8GB of RAM and parallel RHEL 9 (pi8.mynet.ip) to use Nginx with subdirectory routing. The Ansible code ran on a Fedora 36 workstation, the alternative being a Windows subsystem for Linux

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 127 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice