Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (276)
  • Article (45)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 33 Next »

100%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
features of Google+ to launch a B2B marketing campaign, for example.” Blossom says that despite controversy surrounding Google+ requirements for users to use “real” names instead of pseudonyms, he commends ... Google+ isn’t officially ready for corporate use, but users are already excited about what this new social networking platform means for the workplace. We look at how you can leverage Google’s ... Google+ with Business ... Google+ Means Business
80%
DNS name resolution with HTTPS
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by saeed karimi on Unsplash
Besides the common routing protocols, the Domain Name System (DNS) is one of the longest serving infrastructure protocols on the Internet. As the number of participants on the jointly developed ... Now that web content is encrypted by HTTPS, the underlying name resolution is often unprotected. We look at the classic DNS protocol and investigate whether DNS over HTTPS could be the solution ... DNS name resolution with HTTPS
77%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
entire networks or hosts and search for specific vulnerabilities. Google comes to the aid with its Tsunami [1] offering. Because it is not an official project, Google does not provide any support ... Google Tsunami security scanner detects errors that typically signal danger and outputs alerts. We look into how you can get the tool up and running and even write the required plugins yourself. ... Google Tsunami ... Discover vulnerabilities with Google Tsunami
70%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
If a customs officer wants to know whether a freighter from, say, Brazil really has bananas on board, they simply look inside the containers. Google's test tool with the somewhat unwieldy name ... A new test tool by Google lets you peek inside Docker containers, so you can make sure they hold exactly what you expect. ... Google, tools, container, Docker
70%
Open source calendar synchronization
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by jason hafso on Unsplash
Almost everyone has a Google account, so synchronizing calendars (such as your Thunderbird calendar) between your computer and an Android device with Google seems like an obvious solution. If you ... If you use your Google account to synchronize appointments between your smartphone and your desktop computer, you can do this just as easily with an open source solution. ... Open Source, Google, smartphones, desktop
70%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
, access policies, and so on. Cloud providers also started realizing these needs and started providing users the capabilities to launch or mock important services locally. Local GCP with Emulators Google ... Mock and emulate AWS services locally and use official Google Cloud Platform service emulators to unblock development and operations – all without paying a dime. ... Google, cloud, Amazon AWS
69%
Visualizing kernel scheduling
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 36clicks, 123RF.com
SchedViz [1] is one of a variety of open source tools recently released by Google that allows you to visualize how your programs are being handled by Linux kernel scheduling. The tool allows you ... The Google SchedViz tool lets you visualize how the Linux kernel scheduler allocates jobs among cores and whether they are being usurped. ... Open Source, Google, tools
69%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
) and has admittedly invented a far nicer name than Google. BeyondCorp, LISA, and most zero trust approaches use the same basic principles; therefore, in the further course of this article, I will no longer ... Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles ... Administration, IT, Google, security
67%
Databases in the Google Cloud
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jon Parry on Unsplash
Terraform resource definition, resource "google_sql_database_instance" "instance" { name = "mysql-instance" region = "us-central1" database_version = "MYSQL_8_0" settings { tier ... The Google Cloud Platform offers a wide range of different databases for various purposes. ... Google Cloud Databases ... Databases in the Google Cloud
66%
Google Cloud Storage for backups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © lightwise, 123RF.com
. Memory Classes and Access Times As in AWS, buckets are containers that store objects. They cannot be nested and must have a unique name across the entire Google Storage namespace. GCS also supports object ... We compare Google Cloud Storage for Internet-based backups with Amazon S3. ... Google Cloud Backup ... Google Cloud Storage for backups

1 2 3 4 5 6 7 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice