Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (153)
  • Article (3)
  • News (3)
Keywords

« Previous 1 ... 9 10 11 12 13 14 15 16

16%
OpenStack workshop, part 1: Introduction to OpenStack
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
to manage and monitor all of the OpenStack core services (Figure 5). Figure 5: In addition to the agents for Keystone and Glance, all other Open
16%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
that the firewall is currently monitoring are shown on a separate screen in Diagnostics | States . In addition to this, pfSense collects statistical data, such as the number of packets inspected. This data
16%
Zarafa on the Univention Corporate Server
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Andres Rodriguez, 123RF.com
.cfg, ical.cfg, licensed.cfg, monitor.cfg, ldap.cfg, and spooler.cfg – as well as the Postfix master.cf and maincf mail routing configuration files. Zarafa4ucs thus creates and provides certificates
16%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
will respond with RST whether it is open or closed. The ACK scan is thus only useful for finding out whether a port is filtered. The trick is to monitor the window size, which tells you the cache usage status
16%
Installing and managing thedistributed GlusterFS filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Tetiana Pustovoitova, 123RF.com
which keeps clients from accessing the volume. Then, you can delete as follows: gluster volume delete examplevolume GlusterFS offers profiling and monitoring tools that help you quickly identify
16%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
and respond to read operations. If the write master fails, the remaining group elects a new master. The Community edition of Neo4j is released under GPLv3. The Advanced edition includes monitoring capabilities
16%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
is currently active and monitoring/logging security events on the system, but permissive mode means that violations of the current security policy are being allowed to happen. This mode is often used for testing
16%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
max 100 hard 0 weight 0 prio 0 sx 1245525 rx 1754046 Pen can save its status in an HTML file, which you can open with a browser or integrate in your monitoring infrastructure. ./penctl localhost
15%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
to mention is that you can both enable the VPN connection by sending traffic, and click to enable or disable in the monitor area of the GUI. Conclusions In the end, all the tests were successful, although

« Previous 1 ... 9 10 11 12 13 14 15 16

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice