Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 113 Next »

10%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
experience as offered by local SMB file servers, without needing a dedicated virtual private network (VPN). A QUIC approach resides in the controversial environment of DNS encryption: DNS-over-QUIC could
10%
Samba domain controller in a heterogeneous environment
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Zachary Nelson on Unsplash
. For this reason, I used two Debian variants in the test setup: the current Debian 11 on a virtual machine and an ARM CubieTruck single-board computer with Armbian 5.9, which is based on Debian 10. In smaller
10%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
the clipboard rounds off the feature set, leaving virtually no wishes unfulfilled. The option to write the output to files means that you are not restricted to the GUI in the tool but can process the info
10%
Automation with Chef
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Pablo Bustos on Unsplash
. Unlike other tools, Chef focuses solely on the management of operating systems and applications, but not on the provisioning of virtual machines (VMs) or cloud infrastructure. Basic Terms To begin, we
10%
Keeping it simple – the Ansible automator
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Komkrit Suwanwela, 123RF.com
of systems stored in Ansible. If you use OpenStack, either as a tool for managing bare-metal systems or for running virtual machines, you can retrieve the list of target instances directly from the Open
10%
The advantages of configuration management tools
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Galina Peshkova, 123RF.com
. Virtually all subjects in the test aim to provide added value beyond key-value stores. Etcd and Consul promise particularly efficient tools for fleet management services. Consul, for example, comes
10%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
For years, Nmap [1] has been essential to system administrators. There are virtually no alternatives to the classic tool for penetration testing. Out of the box, this tool already gives you more
10%
MariaDB MaxScale: A smart proxy for MySQL
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
SQL clients typically do little more than open a database connection and send a query, which can lead to inefficient operation and failure of a MySQL cluster. Virtually all common implementations
10%
Transparent SIP communication with NAT
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © studiom1, 123RF.com
). If the host has several interfaces, the agent obtains a candidate from each interface. The candidates of the computer interfaces (including virtual interfaces) are referred to as host candidates. The agent
10%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
to create and manage rules. With the help of its own virtual machine, nftables ensures that rulesets are converted into bytecode, which is then loaded into the kernel. Not only does it improve performance

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice