Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1444)
  • Article (117)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 168 Next »

34%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
-Client, Samba-Winbind [2], and the Kerberos package, which is typically called krb5 , or something similar, by most distributions. Once you have all of these components in place, you can launch
34%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
a user name and password associated with it; a strength meter and password generator are included to help you generate secure passwords (see Figure 5
34%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
CentOS 5 to 6 would work – a procedure the release notes advise against – a virtual environment seemed like the prudent decision. The first step is to create a copy of the current system, which should
34%
PipeCD for CI/CD
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Kazuo ota on Unsplash
's Elastic Kubernetes Service (EKS) [5], for example. Besides ArgoCD, admins and developers have to work with at least one other tool, such as Terraform
34%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
in this article can be helpful in this regard. Infos dnsrecon: https://github.com/darkoperator/dnsrecon fierce: https://www.kali.org/tools/fierce/ dnschef: https
34%
MAT: Monitor your infrastructure with Netdata
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
monitored container. In this way, Netdata can display a coherent view in the user interface, providing information on both the service itself and the Kubernetes context in which it is running (Figure 5
34%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
 $socket "system.loadavg_5min $lavg[1] $ts\n";  print $socket "system.loadavg_15min $lavg[2] $ts\n";  sleep(60); }   close($socket); The example client in Listing 1 sends the load average values of the last 1, 5, and 15
34%
Office 365 vs. Google Apps
19.01.2012
Home »  Articles  » 
 
, which you can assign via the administration dashboard after registering with Google Apps (Figure 5). Like Office 365, Google requires you to legitimize by creating a DNS record
34%
Working with the Lustre Filesystem
24.02.2022
Home »  HPC  »  Articles  » 
will be configured as client machines and the rest as the servers hosting the Lustre filesystem. Although not required, all eight systems will run CentOS 8.5.2111. As the names imply, the servers will host the target
34%
iSCSI: Set up and use LIO targets
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Volodymyr Krasyuk, 123RF.com
into trouble, the help command will prove useful. Additionally, you can find useful documentation on the LIO project website [5]. Many Roads … Targetcli can use a variety of backstores that store the data

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 168 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice