Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (167)
  • Article (1)
  • News (1)
Keywords

« Previous 1 ... 9 10 11 12 13 14 15 16 17 Next »

17%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
/ceph/$name.keyring 04 [mon] 05 mon data = /srv/mon.$id 06 [mds] 07 [osd] 08 osd data = /srv/osd.$id 09 osd journal = /srv/osd.$id.journal 10 osd journal size = 1000 11 [mon.a] 12 host = alice 13 mon
17%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
Framework (SM) [12]. This system, which is also known as BDSM, is a scripting framework for server automation, which is mainly maintained by the RVM developers. This approach opens up interesting synergies
17%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
than 4GB of RAM. If your setup is not too large, you should be able to back up the environment's new data and the metrics data history for around a year on 500GB. Debian GNU/Linux 12 is strongly
17%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
or about its findings in general. The Coroot developers offer a comprehensive solution by seamlessly connecting to various pager and operations services out of the box, including PagerDuty [12] and Opsgenie
17%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
[12], and Icinga [13], with the advantage that existing alert chains and escalation levels can be rehashed without any problems. Once Falco is connected to the existing monitoring system, alerts
17%
Using Univention Corporate Server 2.4 for virtual infrastructure management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Martin B, Pixelio.de
the administrator over with its carefully conceived overall concept and production-tested preconfiguration. Administrators can complete the installation with just a couple of key presses; in fact, pressing the F12
17%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
-ons. This explains why there have been more than 3 million new Nagios installations worldwide in the past 12 months. This is why Nagios is the industrial standard for monitoring today. … Nagios has a much larger
17%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
/usr/lib64/ruby/1.8/logger.rb:487:in `initialize' 12 /usr/lib64/ruby/1.8/logger.rb:263:in `new' 13 /usr/lib64/ruby/1.8/logger.rb:263:in `initialize' 14 /usr/lib/nagios
17%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
10 11 12 13 14 15 16
17%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
://www.un.org/apps/news/infocus/sgspeeches/ "Apache ModSecurity with GeoIP blocking country specific traffic: ModSecurity + GeoIP" by Suvabrata Mukherjee: http://linuxhelp123.wordpress.com/2008/12/11/apache The Author Sebastian

« Previous 1 ... 9 10 11 12 13 14 15 16 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice