Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1005)
  • Article (294)
  • News (153)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 146 Next »

16%
Integrating FreeNAS with Windows Active Directory
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Parisod@Snowmelody, Fotolia.com
window in Figure 6. Fill this in with the required information for the target server to which you will backing up. Once you are done, simply click Do backup . To verify that the backup has taken place
16%
Interoperability across clouds
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © alenavlad, 123RF.com
, so developers and administrators can gain some initial experience. Commissioning ARIA TOSCA The TOSCA implementation is based on Python and requires a Python 2.6 or 2.7 interpreter; version 3
16%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
with the integrated system script: sudo apt-get install openjdk-8-jre wget http://pub.nxfilter.org/nxfilter-4.3.6.1.deb sudo dpkg -i nxfilter-4.3.6.1.deb sudo systemctl enable nxfilter sudo systemctl start nxfilter
16%
New features in PHP 8
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Maxim Borovkov, 123RF.com
arguments, you also choose the order of the parameters according to your needs. Optional parameters can also be omitted, like $depth in the example shown in Listing 6. By the way, Listing 6 shows a further
16%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
: docker commit / One example is: docker commit 662f25d6d835 joos/joosimageweb Besides using the terminal, you can also manage containers in WSL from the Docker Desktop
16%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © 123RF.com
, you need to create an Amazon account [6] and then log in to your it [7]. Next, click on Create Distribution (Figure 2), and select Web | Continue . Under Origin Settings, enter the full address
16%
Security after Heartbleed – OpenSSL and its alternatives
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Ilya Masik, fotolia.com
was in a function that hardly anyone uses and was thus completely unnecessary. Bob Beck, a core member of the OpenBSD team, makes clear in a presentation [6] (Figure 6) the amount of unnecessary code that OpenSSL has
16%
Up close with SUSE Linux Enterprise 12
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © kasza, 123RF.com
. The new YaST interface is reminiscent of the KDE control center or the Xfce configuration dialog (Figure 6). If you have many tiles for individual modules, the window quickly becomes cluttered
16%
OpenStack Trove for users, sys admins, and database admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © cheskyw, 123RF.com
intervention by the user. The command: trove create lm-slave 1 --size 2 --slave_of ae427c76-eee3-11e6-802a-00215acd73e2 would add a slave node named lm-slave of flavor 1 to the database with the ID ae427c76
16%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
. Magic?! To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command: $ aws iam create-policy-version --policy-arn arn

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice