Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1260)
  • News (419)
  • Article (309)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 200 Next »

17%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
Active Directory infrastructure, and show how powerful the system is in conjunction with well-known software-as-a-service (SaaS) offerings – all of which will provide the overall picture needed ... Azure Active Directory from Microsoft provides advanced, centralized authentication in the cloud. We show what this powerful system can do.
17%
Managing BitLocker with PowerShell
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © sergey Mayorov, 123RF.com
of the option to automate the setup and configuration of hard drive encryption. This is where PowerShell comes into play. Microsoft provides command-line tools and matching cmdlets in the form of manage ... BitLocker provides current Windows versions a good, closely integrated encryption solution and lets you manage and maintain this feature with PowerShell.
17%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
applications. The mechanisms known on FreeBSD (chroot or jails) are not really an answer. One remedy is to lock applications up in a sandbox, an environment that provides only very limited resources. However ... Applications such as web browsers can open up vulnerabilities and threaten an entire system. As a remedy, Capsicum provides the option of finely granulated allocation of privileges on top
17%
Admin as a service with sysstat for ex-post monitoring
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Levente Janos, 123RF.com
records the share of involuntary waits that occur, for example, if you are looking at a virtual machine and the hypervisor distributes CPU time differently. Finally, idle provides information about time ... The top, vmstat, and iotop monitoring tools for Linux show the current situation but do not provide any information about the past – which is where sysstat comes into play.
17%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
's feature set not only to query status information but also to create new systems or define other virtual resources, such as networks. On Fedora systems, the Python bindings are provided by the libvirt ... If you do not want to use any of the major management frameworks to manage your virtual machines, the Libvirt library for Python provides an alternative.
17%
Simple Event Correlator
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © cepixx, 123RF.com
-known wildcards to provide greater tolerance. Thus, the above pattern could look like this: pattern=Failed password for (\w+) Now SEC alerts for each failed SSH login, because the \W+ regex stands for one or more ... The Simple Event Correlator is a small Perl program that supports analysis of logfiles with a view to security. In this article, we provide an introduction to SEC's rules and actions.
17%
Continuous integration with Docker and GitLab
17.07.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © alexutemov, 123RF.com
Approach The classic approach is to install the services needed on central servers (see the "Deep Infrastructure" box), provide them with the corresponding configuration files, and operate them ... GitLab provides the perfect environment for generating Docker containers that can help you operate critical infrastructure reliably and reproducibly.
17%
Application Monitoring with openITCOCKPIT
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Author, 123RF.com
IT environments comfortably, openITCOCKPIT offers service template groups. As a result, identical hosts do not need to be provided manually with the same checks. To accomplish this, you create a new service ... A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
17%
ADMIN Update Newsletter
06.12.2011
Home »  HPC  »  Newsletter  » 
 
Our ADMIN Update newsletter provides tips and practical solutions for configuration, security, and system management in heterogeneous environments.   Register for ADMIN Update!
17%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
Partition alignment changes as drives evolve, and proper alignment is necessary for maximum performance. We provide some tips to help you get things back in order.

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice