Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (103)
  • News (22)
  • Article (8)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

38%
Inventory and manage your IT systems
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Edryc James P. Binoya on Unsplash
types for the same network makes sense. For example, one scan could provide a basic overview of the existing systems, and another could provide detailed information on these systems
38%
Bottom: The new top
07.10.2025
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Lucy Baldwin, 123RF.com
options, what makes btm special? It provides immediate and time series monitoring of CPU, memory, network activity, processes, and disk usage like other tools, but it does it with characteristic flair
38%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
-based distributions are listed in the repodata/xxx-comps.xml file on the installation DVD. Additionally, yum grouplist -v provides a list of all groups, where the group IDs relevant for BoxGrinder are indicated
38%
Centrally manage configuration files
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by The New York Public Library on Unsplash
.stderr is search("LINK: ")' become: false Besides installing the packages Stow and Git, the applications for which you are providing configuration files are also installed. A task then handles checking out
38%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
's built-in tools, you can use the checklists provided by Microsoft to create policies that reduce the existing attack surface, and you can enable or disable the rules in different modes in the Endpoint
38%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
. Licensing Hassle at Docker What kicked off the far-reaching changes to the licensing policy was the acquisition of Docker Inc. by Mirantis in November 2019. The provider now relies on a subscription model
38%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
to leave the maintenance of the application ecosystem to third-party providers of the respective tools. However, in the security context, container-based workloads come with challenges that do not exist
38%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
Version 4 (TCP/IPv4) provide various settings, such as integrating Windows into a Windows domain. The settings are prone to incorrect configurations, so you should check them after setup or if you
38%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
. The ticket screens in version 11 can be customized even more and more clearly than in the past. Dynamic fields can be provided in different orders on different screens and with individual labels. The option
38%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
to your command. When you receive the expected response, you enter another command and so on. Expect works in the same way, except you have to provide the script with commands and expected responses

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice