Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 189 Next »

10%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
Shell. Even there, importing the entire Graph module, including all the dependencies, takes several minutes and bumps up the RAM utilization of the PowerShell session to somewhere between 2 and 5GB. If you
10%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
all the components you need for a small system (Figure 5; Table 2). Figure 3: The steps to installing iRedMail on Rocky Linux 9 by the downloadable
10%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
of a general architecture for distributed monitoring. Some systems such as Checkmk [5] or Zabbix [6] support this type of architecture by default. However, the emergence of distributed monitoring strategies
10%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
direction: It acts as a container registry with security checks at the registry level. Harbor [5] primarily checks the images stored in the central registry instead of leaving this task to the admins
10%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
with an Ethertype of 0x88e5 on the provider's network. Because MACsec works on Layer 2, it must be individually enabled for each interface. Encryption Method MACsec uses AES-GCM as the encryption algorithm
10%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
: DEC VAXVMS TCPIP V5.1-15 .... Do you want to continue? [YES] When installation is complete, you need to license the product. You can do this interactively – as described earlier – or use a call
10%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
. SMTPDiag is an important diagnostic tool for mail flow that you can download from the Microsoft website [5] free of charge. With this tool, you can diagnose problems with SMTP delivery at the command line
10%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
. Managing Office 365 in PowerShell Administrators can manage all editions of Office 365 in PowerShell, even without running local servers (Figure 5). Microsoft provides the required cmdlets for free [5
10%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
of a server – from the moment in which the admin adds it to the rack to the point when the admin removes and scraps it. To achieve this goal, MAAS usually teams up with Landscape [5] by implementing all parts
10%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
and display the status messages in the monitoring tool. Additionally, according to its developers, Inktank [5] is working to improve support for the current monitoring tools; on that front, you can expect

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice