Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 148 Next »

13%
The Dilemma of the Ten-Second Commute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Larry Ewing (lewing@isc.tamu.edu) and The GIMP; Tux added protection by Maria
. And there were those pesky calls from our network operations center in the middle of the night. Ah, the good ol' days. I worked remotely for 10 years until all the big companies brought everyone back into offices
13%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
way to install a Neo4j instance on your home computer is to use a Docker container, which the command docker run retrieves from the network to launch a Neo4j server (Figure 3). Then, you can jump
13%
News for Admins
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
 
, including its Fusion Middleware product set, which received 53 new security fixes overall – 42 of them for vulnerabilities that could, in theory, be exploited remotely over a network with no user credentials
13%
Private cloud with Microsoft Azure Stack
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mikko J. Pitkänen, Fotolia.com
), Azure VM scale sets, Azure Storage (blobs, tables, queues), Azure networking (virtual networks, load balancer, VPN gateway), and Azure Key Vault. PaaS: Azure App Service (Web Apps, Mobile Apps, API
13%
Integrating scripts into Group Policy
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © abidal, 123rf.com
also store Group Policy Log View in a logon script. It will then run on any machine that uses the logon script and give you central information about all the machines on the network that use this policy
13%
Privacy Concerns: Beyond the GDPR
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © RAJESH RAJENDRAN NAIR, 123RF.com
network. I rarely post to the Public unless it's related to my articles or other journalistic writings. You should also Google yourself to find out what the Internet knows about you. Explore the various
13%
What's new in SQL Server 2017
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Fet, Fotolia.com
-server service requires a restart. The sqlcmd command-line query for Linux should reside on a database server, as well, in case network connectivity is interrupted. This utility is also in a separate package
13%
Effective debugging of Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Stuart Monk, Fotolia.com
within the namespaces defined for that container, such as the network and process namespaces that already exist for the container. If you append the -it parameters docker exec also works interactively
13%
Automate the Active Directory Federation Services install
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © drubig-photo, fotolia.com
a certificate authority (CA) in your organization or be a public certificate that is valid outside of the corporate network. It is important to issue the certificate and then export it as a file to be able
13%
Interview with the developer of Singularity
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wu ruiyun, 123RF.com
within a Docker image that they have created can easily escalate to root. But if any non-authorized users gain root access on our production network, that is a breach of security. This means that we must

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice