Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (15)
  • Article (1)
Keywords

1 2 Next »

100%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... of machines. Tools such as FAI created for physical machines are of use when deploying virtual machines, as well, as are distro-specific tools (e.g., autoinstall for OpenBSD [2], preseed for Debian [3
98%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... is not verified. The purpose of this routine is to prevent man-in-the-middle (MITM) attacks. Sake uses the x/crypto/ssh Go package, which is a bit quirky [3]. An issue I stumbled on when testing Sake
46%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
, as in Python [3] or Node [4]. Recent books have been published about writing shell commands in Rust [5], Python [6], Node.js [7], and even Go [8], and it is into this last language's interesting performance
43%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f3c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e6c4e1f
43%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
. In this case you will select the Quiet Mode Option. The final touch will be to make sure you get alerts when something fails at 3:00am, so you will be notified (or not). The Beep Control option is especially
42%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
quark | CHANGED | rc=0 >> /dev/testlv 64.00 62.67 3% 4 1% /testfs Now, to create a playbook to remove the filesystem you just created, go to the /etc
42%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
: curl git pkg-config 0 upgraded, 3 newly installed, 0 to remove and 1 not upgraded. Need to get 3,409 kB of archives. After this operation, 19.5 MB of additional disk space will be used. Get:1 http
40%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i Figure 2: Getting all secrets from containers in the cluster. 6. Container breakouts: Attackers might exploit vulnerabilities
39%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
fields that do not exist in the other types. For example, the Car dataset has fields such as mileage and features (lines 6 and 7), whereas Motorcycle has an engineCapacity field (line 14), and Bicycle has
39%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
have 26 cores or 52 hyperthreads per NUMA node for the VM. Figure 2 shows a four-socket server with 28 cores per socket and 6TB of RAM. Figure 2: A four

1 2 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice