Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (213)
  • Article (2)
  • News (2)
Keywords

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 22 Next »

17%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
(Figure 4). You will definitely need to enter some settings here for live migration if you run Hyper-V in the cluster – especially when you activate the operating system; otherwise, you will continually
17%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
, most administrators should be aware of the coming "IPocalypse," with the world running out of IPv4 addresses. If you are not already preparing for the coming of IPv6, it's time to start – and if you
17%
Client management and configuration
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Wamsler, Fotolia
predefined reports, you can also modify reports to suit your own requirements or generate new report types. Desktop Authority includes its own reporting tool (Figure 4) for this purpose, which is extremely
17%
Virtualization with Microsoft Hyper-V
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Roman Sigaev, 123RF
and disable time synchronization between the host and the guest system in the Integration services section (Figure 4). Then, log in to the guest system with a local user account and restart the Windows
17%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
pass. To register for ISC Cloud'12, please use the code cloud4isc-2012 . For more information, visit: http://www.isc-events.com/cloud12/. Phishing
17%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
debuted in Ubuntu 11.10. The initctl show-config command that gives an overview of the jobs has been around since Upstart 0.6.4 (Figure 3): initctl show-config -e > output
17%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
Cannon, and Eclipse. The goal of Cloud Engine is to implement an open source cloud broker (Figures 4 and 5). The Deltacloud API is used here to facilitate views on the virtual clouds of each user, as well
17%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
machines with a 32-bit operating system and 64-bit system, but not the other way around. Using a 64-bit kernel as your basis also has the advantage that you can use more than 4GB of RAM. Thus, you can run
17%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
and computational resources. The processor saves the most energy in the C3 and C4 states, which is where you want it to spend the most time. Ideally, the CPU will sleep for 95 percent of the time in one of these two
17%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice