Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (351)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 39 Next »

70%
TheSSS: World's Smallest Server Suite
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © zhao lizu, 123RF.com
, it still does not support UEFI firmware, thus forcing admins to enable the BIOS emulator on newer systems. Choice SourceForge [3] offers three flavors of TheSSS: Although the ISO image (TheSSS-8.0.iso
70%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
is not actually necessary for deployment; instead, you can install Dashy on any standard Linux system. Besides Git, you also need Node.js and Yarn: git clone https://github.com/Lissy93/dashy.git && cd dashy yarn
70%
LDAP integration with popular groupware suites
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Sergey Tryapitsyn, 123RF.com
leading open source groupware alternatives. Table 1 compares the LDAP support in the open source groupware tools Open-Xchange [1], Tine 2.0 [2], Zarafa [3], Kolab [4], EGroupware [5], Scalix [6
70%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
-SQL and can, with appropriate knowledge, be adapted to your own needs  [3]. To modify an existing query, click the lock icon in the toolbar above the code editor. The code is then released for editing
70%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
of its low resource consumption and good performance. The Apache web server has also added Mod-Lua to its core distribution [3]. The OpenResty modules make it possible to use Lua instructions
69%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
discovering the "normal" behavior of your resources, you can then tweak the rulesets to account for anomalies with great ease. The Mothership The architecture includes a centralized server known
69%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
therefore become a genuine community project. However, Kubernetes (aka K8s, because of the eight letters between the K and the s) also seems to have driven a wedge into the normally closed ranks
69%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Rgbspace, Fotolia.com
can find ReaR in the EPEL repo. SUSE Linux Enterprise includes ReaR packages but only in an older version. (Version 1.14 is also available for openSUSE [3], however, I experienced problems
69%
An overview of VMware tools
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Giuseppe Ramos, 123RF.com
. Figure 3: vCloud suite architecture (from vmware.com). vFabric Application Director The vFabric middleware suite [4], consisting of Data Director, SQLFire, GemFire, PostgreSQL, and RabbitMQ, serves
69%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
grows significantly. In both cases, attackers can access not only the services that the user regularly uses but also other systems on the network that the user does not normally access. These attacks

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice