Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (158)
  • Article (6)
  • News (4)
Keywords

« Previous 1 ... 9 10 11 12 13 14 15 16 17 Next »

24%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
" for a remote terminal unit, like those used in water treatment plants and pipelines that appeared to be connected to the Internet. The result also included a password: 1234. Many Google search directives
24%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
and reseller functions, DNS configuration, backup, remote access functions, package management, database administration, daemon control, and pretty much anything else you might need to run a domain and web
24%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
-specific security configuration. By default, the following services are not enabled: Telnet, FTP, and TFTP. To log into the server remotely, use the SSH protocol. SELinux on RHN Satellite Server 5.4.1 must
24%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
services and systems or take up large amounts of bandwidth while performing the script. Malware – Malware scripts are scripts designed to identify malware running on a remote host. Safe – Safe scripts
24%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
't support diagnostics across the network by remote access. However, you can filter specific processes, errors, or request results. The tool selects the results so that you can perform targeted monitoring
24%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
Integrations & Plugins and in the GitHub repository, with candidates including Grafana, Telegram, Slack, Zabbix, and Fail2ban. Extensions such as pinger and urlmon let Alerta independently check the remote
24%
MAT: Monitor your infrastructure with Netdata
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
these values directly by HP Integrated Lights-Out (iLO), IBM Rational Software Architect (RSA), and Dell Remote Access Controller (DRAC) or generically with the Intelligent Platform Management Interface (IPMI
24%
Introduction to OpenMP programming
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Frank Rohde, 123RF.com
application. Today, it's very easy to get laptops with at least two, if not four, cores. Desktops can easily have eight cores with lots of memory. You can also get x86 servers with 64 cores that access all
24%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
, geographically remote StorCenter. At least this kind of centralized storage on the web is a useful thing to have for smaller businesses or branch offices, given that it avoids a subscription fee and keeps access
24%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
a remote application that reacts differently to how much bandwidth is available for your Internet connection. Using tc, it is possible to alter your throughput quickly with a (relatively long) single command

« Previous 1 ... 9 10 11 12 13 14 15 16 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice