Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1045)
  • News (229)
  • Article (225)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 151 Next »

13%
Open source calendar synchronization
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by jason hafso on Unsplash
. You can choose to run the Nextcloud software on a private network, such as network-attached storage (NAS) or a Raspberry Pi. The disadvantage is that if the calendars cannot be accessed via the Internet
13%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
13%
High Availability without Pacemaker
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © madpixblue, 123RF.com
the best solution for security and routing on the corporate network. Although there is nothing wrong with this assumption, you will rarely need more than one DHCP server or a huge number of iptables rules
13%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
is not supported. Moreover, it is imperative for each table to have a primary key. Surprisingly, IPv6 is still lacking – in 2017! Currently, network communication between the replicating nodes relies on IPv4
13%
Combining containers and OpenStack
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Dmitriy Melnikov, Fotolia.com
, such as communicating with Glance to provide the necessary images or with Neutron for the network. Another project plays an important role: Kuryr [10] forms the bridge between the network worlds, with OpenStack on one
13%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
Kafka Container Machines Config cluster: name: cluster privateKey: cluster-key machines: - count: 3 spec: image: rockylinux8 name: kafka%d networks: - cldinabox-demo port
13%
Open source monitoring with Zabbix
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Vincentiu Solomon on Unsplash
monitoring classic servers or arbitrary networks, operational technologies (OTs) and Internet of Things (IoT) devices, or modern containers and cloud-based infrastructures, Zabbix plays to its strengths
13%
SQL Server 2022 and Azure
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
, you could deploy cloud databases with Azure SQL, but you had to rely on a virtual database server. All you could save by migrating was the overhead of running a physical server on your own network
13%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
really aren't just talking about system logs. Log ingestion also means logs from network devices, storage systems, and even applications that don't always write to /var/log. A key factor that can
13%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
network as the computers you need to set up. In this article, I look at the SaaS solution. To create an account, you only need an email address, which is verified by the system. After registering

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice