Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (201)
  • Article (9)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 ... 22 Next »

59%
PipeCD for CI/CD
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Kazuo ota on Unsplash
ArgoCD uses the Helm package manager. Helm is considered an absolute standard tool in the Kubernetes scene. In principle, it does the same thing for containers as RPM or DPKG do for Linux packages
59%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
on updating packages once a quarter. Although you are updating the host's software and the runtime environment for the containers (e.g., Podman or Docker), the software in the containers does not benefit
59%
Network monitoring for Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© spectral, 123RF.com
doesn't include a solution for creating automatic network maps like those offered by, for example, WhatsUp Gold [2]; instead, the administrator must do this manually. The Map section in PRTG does offer
59%
Link aggregation boosts securityand increases throughput
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© zentilia, 123RF.com
network components are still relatively expensive, bundling of several 1Gb connections in a LAG is a cost-effective alternative wherever high bandwidth is required. However two 1Gb links in a LAG does
59%
Microsoft Exchange 2010: The Highlights
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© peapop, Fotolia.com
an archive for each member of staff, although this is a premium feature and does require an Exchange Premium Client Access License for each user (Figure 4). Once enabled, the archive is automatically displayed
59%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
of your logs. Figure 1: The consequences of swap hitting 100%. A system that does not have swap space configured can still swap to disk
59%
Configuring WireGuard with wg-portal
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
and configuration and reveal the drawbacks involved in daily VPN use. Docker Image You need a WireGuard installation in place to try out the Docker image, although the installation does not have to be fully
59%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
. Ansible does not rely on the complicated declarative syntax that Puppet uses. Instead, Ansible instructions are more like commented shell scripts that list the tasks to be performed step by step in exactly
59%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
for NetBox or other common IPAM tools. In general, you can see that Foreman fully embraces its role in an IT setup as a "single source of infrastructure truth" [2] and does not tolerate additional tools
59%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
for the VPN setup described in this article. Finally, you just need to store the new user certificates on the users' e-tokens. The following command openssl pkcs12 -export -in John_Doe.\ crt -inkey John_Doe

« Previous 1 2 3 4 5 6 7 8 ... 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice