Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 143 144 145 146 147 148 149 150 151 152 153 154 155 156 ... 160 Next »

37%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
, virt-clone assigns a random MAC for the network card in the new virtual machine. Although you can assign a MAC address manually with -m, this does nothing to alter the issue that occurs with some network
37%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
6) and Nmap will not print any results. On the other hand, if the port is running TCP, the logic continues and the script determines whether Nmap has access to the SSL client libraries. If it does
37%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
or /etc/rvmrc. The configuration is optional, but it does let you set specific compiler flags and paths. For a list of options, check out the ~/.rvm/examples/rvmrc file. The use of project-specific .rvmrc
37%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
cheaper than upgrading a processor, it makes sense to investigate the situation upfront. CPU load isn't a problem if it is only short term or only occasionally rises above 90 percent. It does become
37%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
will be important later when deploying the Tactical agent. Adding Hosts The best RMM environment is useless if it does not contain hosts that it can manage further down the line. Logically, the next step
37%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
profile::cis::sudo { package { 'sudo': ensure => installed, } } A policy is expressed as a declarative: If sudo disappears, Puppet reinstalls it. If it's already there, Puppet does nothing
37%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
check whether a new attempt starts the installation process. If this does not happen, check your Kali Linux installation. If you have been using it for some time, previously installed tools could
37%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
to simplify the result. A partial unroll where the number of cycles does not divide evenly by the unroll factor leads to a peculiar C construct known as Duff's device [7], intermingling a switch and a while
37%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
not attempt to resolve their replication partners with the conventional host A entry but use the stored CNAME instead. If replication does not work because entries are missing below the AD DNS domain, you can
37%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
monitoring points on devices but does not want to install commercial monitoring agents for cost reasons. If the IoT application is under your control, monitoring can also be integrated into the application

« Previous 1 ... 143 144 145 146 147 148 149 150 151 152 153 154 155 156 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice