Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (201)
  • Article (9)
  • News (1)
Keywords

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 22 Next »

59%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
balancing, but the model does support centralized management of all the nodes in the cluster, even though the individual virtual machines in a Proxmox cluster are always assigned to one physical server
59%
Boost performance of your Python programs
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Eric Isselée, 123RF
multicore machines. To overcome this limitation on Python programs, one uses subprocesses in place of the threads in the Python code. Although this subprocess model does have some creation and interprocess
59%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
indicative of how the tool stores its data. When it creates a database, the system allocates only enough disk space for a certain period of time and does not expand the database after this time; instead
59%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
that checks the consistency of the DNS record against the transmitting server to prevent spam. Many mail servers are configured to discard mail if the DNS record does not exist or is inconsistent. Firewall
59%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
Harvester. For instance, Metasploit's use of the gather tool does not allow you to search for PGP accounts, although it will search for email in Google, Bing, and Yahoo. Network Discovery with Paterva's Maltego Paterva
59%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
by Microsoft's Systems Management Server (SMS). Implementing a Satellite server does not necessarily change the current patch management process; however, the Satellite server will automate the retrieval
59%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
name resolution (LLMNR) DNS support DNS support Source and Destination Address Selection RFC 3484 RFC 3484 RFC 3484; administrative interface does not exist
59%
Snapshot management for Azure VMs
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © meepiangraphic, 123RF.com
Management in the Portal Of course, you can also create snapshots of Azure VMs in the web portal GUI. In contrast to hypervisors such as Hyper-V, vSphere, or Proxmox, though, Azure does not grab snapshots
59%
SC25 Highlights
20.01.2026
Home »  Articles  » 
 
system design, or do you need to add more? Does cooling become a limiting factor for system design? Many system manufacturers are turning to liquid cooling their nodes. You must carefully plan for liquid
59%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
. You can tell that gpufetch  needs updating, because it doesn’t know the GPU processor or the microarchitecture and technology; however, it does give you some reasonable details, including: max

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice