Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 146 Next »

24%
Creating SmartOS zones using UCARP
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Le Moal Olivier, 123RF.com
on another hypervisor in case of failure of the server hosting it. If you want high availability or high reliability, you have to be modern. You should learn concepts and technologies like Node.js, cloud
24%
Automated builds using CentOS 7 and Kickstart
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Icetray, fotolia.com
ip addr show which lists the interfaces recognized by the system. In my case, the Ethernet interface was identified as enp0s3. Next, you can edit the network configuration file for the interface with
24%
Automatic build and deploy with OpenShift and GitLab CI
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Photo by Jantine Doornbos on Unsplash
should keep in mind the tag you gave to your Runner during the installation – in this case, docker (Figure 6). Figure 6: Available Shared Runners on Git
24%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
and alerting, trending is also necessary; in many cases, it is the only way you can know when to add hardware to compensate for an increased base load. Soon it becomes clear that typical monitoring solutions
24%
Link aggregation with kernel bonding and the Team daemon
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Steven Cukrov, 123rf.com
, in the worst case, you will have to start tweaking the kernel itself. A module API like the Team daemon is not found in the kernel bonding driver, so points for elegance of architecture and expandability
24%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
not exist outside of your company. In such cases, you can add your own resources to InSpec. An example, such as an application that stores its metadata in a MySQL database in an unknown, proprietary table
24%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
on UDP and TCP except in the case of NxFilter. In this case, NxFilter acts as the only DNS server that network clients can use. This setup is already transparent and does not cause problems with man
24%
Tinkerbell life-cycle management
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Bee Felten-Leidel on Unsplash
. In most cases, however, this is only a small part of the work that needs to be done. Saying that commodity hardware always behaves in the same way is simply not true. Anyone who has ever had to deal
24%
Manage Windows AD with PowerShell
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Kelly Sikkema on Unsplash
LogonCutOff -and Enabled -eq $true } -SearchBase "OU=Externals,DC=corp,DC=frickelsoft,DC=net" | Disable-ADAccount In the best case, the service accounts that you create as normal user accounts and not as group
24%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
and is attributable to scarce resource availability at the time. In these cases, all processes for the dynamic routing protocols are already activated out of the box, which generates unnecessary load, opens up attack

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice