Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (112)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 102 103 104 105 106 107 108 109 110 111 112 113 114 115 ... 150 Next »

16%
vSphere 5 vs. XenServer 6
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kozinia, 123RF.com
[2] by VMware started to move into the server racks in the summer of 2011, but while I was researching this article, Citrix suddenly burst onto the scene with the XenServer 6.0 release [3
16%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. In this case, the sensor sends messages by the User Datagram Protocol (UDP) to the remote server. For an initial impression of Maltrail, the developers offer an online demo [3]. Maltrail is not particularly
16%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
" according to the assessments after the first tests hardly helped improve the situation. However, this criticism relates primarily to desktop use, and in particular to errors in the new Gnome version 3
16%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
. With RAID 1 and hard disks of 320GB, the whole operation takes one and a half hours (Figure 3). You can view the logfile at any time with the raiderl command. Raider writes the current RAID configuration
16%
Acorn facilitates the deployment of apps in Kubernetes
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Önder Örtel on Unsplash
quickly becomes a nightmare. Kubernetes and the container lobby promise that they will make everything far simpler and easier to manage. However, if you are setting up Kubernetes (K8s) for the first time
16%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
Installing the Ops Agent :> agents_to_install.csv && echo '"projects/playground-gs/zones/europe-west3-c/instances/test-vm1","[{""type"":""ops-agent""}]"' > agents_to_install.csv && curl -sSO https://dl
16%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
for the past 10 years. In parallel, a great variety of graph databases have emerged, including the originals like Neo4j [1], distributed databases like Titan [2], free databases like JanusGraph [3], proprietary
16%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
use Ubuntu 22.04, but you can apply all the advice to other distributions, too. ClamAV is used in conjunction with SpamAssassin as a tool for filtering mail. Where action relating to name servers
16%
Interoperability across clouds
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © alenavlad, 123RF.com
advantage being that no changes need to be made to existing configurations. Figure 1: ARIA TOSCA has a wealth of plugins that support connections to IaaS
16%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
the generated certificate to the requester. Encryption and Digital Signatures in Outlook Two approaches have been established for digitally signing or encrypting email: PGP (Pretty Good Privacy) and S

« Previous 1 ... 102 103 104 105 106 107 108 109 110 111 112 113 114 115 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice