Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 95 Next »

11%
New Features in PowerCLI 6.0 R3
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Rgbspace, Fotolia.com
The initial version 6 of PowerCLI, the Windows PowerShell interface for managing VMware vSphere, appeared in March 2015 to coincide with the release of vSphere 6.0. In mid-September 2015, release 2 ... PowerCLI in the current version 6 R3 supports access to nearly all VMware data center and cloud products with around 500 cmdlets, including numerous additional features, APIs, and interfaces ... PowerCLI 6.0 Release 3 ... New Features in PowerCLI 6.0 R3
11%
Protecting documents with Azure Information Protection
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
the selected subscription in Office 365. How these users in the cloud access Azure AD – the location for Office 365 user and group identities – does not matter. The most direct way is to use Azure AD Connect ... Azure Information Protection helps businesses control how information in communications between employees is handled.
11%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
Enterprise asset monitoring can be a daunting and expensive task. If you are interested in asset monitoring but have avoided it in the past because of price or complexity, you can now get a fully ... We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.
11%
Have a Bash with the Zing network utility
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Micah Tindell on Unsplash
2 -p 80,443 bing.com Warning: Inverse name lookup failed for bing.com; unable to continue! Finally, with the DNS utility dig and the resulting IPv4 address, the zing to Bing works (Listings 5 and 6 ... We show you how to implement the zero-packet Ping utility, Zing, as a Bash shell script.
11%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
) Newer implementations with NetFlow version 9 offer additional information about Multicast, IPv6, BGP (Border Gateway Protocol), and MPLS (Multiprotocol Label Switching). The package's information content ... network. We show you how to use Google Analytics to capture and analyze NetFlow data.
11%
Automation with PXE Boot
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Sergey Jarochkin, 123RF.com
). Figure 2: Creating a Kickstart file allows fully automated deployments. Getting Started For this article, I assume all the work is performed in a discrete test lab that is not connected to any other ... We show how to save time and stress by automating your system installations with PXE boot.
11%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
concepts. If you want to roll out Kubernetes yourself, you definitely need to plan for some preparation time to get up to speed. Infos YugabyteDB: https://www.yugabyte.com "Monitoring ... Kubernetes is all the rage, but many admins find themselves struggling to get started. We present the basic architecture and the most important components and terms.
10%
Fundamentals of I/O benchmarking
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
accessing the storage, the greater the overhead becomes, again reducing the cumulative output. There is an optimal number of threads, as you can see in Figures 5 and 6. Depending on the application, you ... Admins often want to know how to measure the performance of a specific solution. Care is needed, however: Where there are benchmarks, there are pitfalls.
10%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
, registry entries or installed services, changes to the hosts file, and the like. Instructions on how to proceed in the event of a demonstrable attack should also form part of the online documentation ... How to deal with threat intelligence on the corporate network when the existing security tools are not effective.
10%
Seven free blocking filters for ads
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © enciktep, 123RF.com
risk from transport layer security inspection: https://bit.ly/34sO6HX Pi-hole privacy levels: https://docs.pi-hole.net/ftldns/privacylevels/ OpenDNS: https://support.opendns.com ... We compare seven free blocking filters for advertisements and look at how they integrate into the network.

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice