Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (205)
  • Article (3)
  • News (1)
Keywords

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 Next »

18%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
systems and performance. With so many options and so many key aspects to HPC storage, a logical question you might ask is: Where should I start? Will a NAS (Network Attached Storage) solution work for my
18%
Unifying events with Splunk
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sebastian Duda, 123RF.com
also run Splunk as a light-forwarding agent. Windows and *nix hosts can also be monitored with Snare agents. Windows and *nix hosts can be monitored with OSSEC agents. Network devices can send
18%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
targeted policy is designed to affect only specific daemons running on the system – typically those operating services that are listening on network sockets and are therefore potential entry points
18%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
is made more complicated by the large spectrum of responsibilities that fall under the "operations" roof. Layer models like ISO/OSI graphically document just how far the work of a network administrator
18%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
on the virtual machines that Qemu provides without fighting over the physical network interface (Figure 1). Figure 1: Thanks to KVM, Windows 7 and openSUSE 11
18%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
and individually for each CPU core. Device stats lists misbehaving devices such as network cards and USB adapters. For the network cards, PowerTOP tells you how many data packets cross the network per second
18%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
). Archive incoming and outgoing email by means of network recording or deploying additional smart hosts (appliances) in the email flow. Archive all email (including internal messages) by integrating some
18%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
Many companies use a proxy to handle web access. These intermediaries on the network make it easy to look for viruses on pages accessed by users and in downloads. Company management often requires
18%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
, requires a name, a zonepath (the zone's root directory), and a network interface setup (IP address, physical binding, and default router). Although you can add several other attributes and parameters
18%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
. MMSOFT offers a variety of deployment scenarios that attempt to serve networks of any size. Installation and Setup On Windows systems, you'll need to install the .NET 4.x framework before you install

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice