Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (430)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 229 Next »

16%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
a shell script evaluates immediately after launching the sensor. Various programs are suitable for automated, "unmanned" access to the service provided by a given daemon; all of them will run in the shell ... Administrators often write custom monitoring programs to make sure their daemons are providing the intended functionality. But simple shell tools are just as well suited to this task, and not just
16%
Moving data to Drupal 8
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Konstantinos Kokkinis, 123RF.com
). The Migrate API is excellent for upgrading from Drupal 6 or 7 and for one-time imports of large datasets. In this article, I look briefly at Drupal-to-Drupal upgrades and provide an in-depth example ... The Migrate API in Drupal 8 provides a suite of modules designed to help you move your data between Drupal versions or into Drupal 8 from outside sources.
16%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
Migration to IPv6 is picking up speed. In the fall of 2012, Deutsche Telekom announced that new DSL customers would have dual stack connections (IPv4+IPv6). Other providers will be following suit ... Now that IPv6 is the official Internet protocol, all that remains is the simple task of migrating all the machines on the Internet. Until that happens, tunnel technologies provide an interim solution.
16%
Privileged Identity Management in Azure AD
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © lassedesignen, 123RF.com
exist and when they are logged on. When administrative accounts are defused by the JIT functions, but multiple roles are still concentrated on one account, privileged identity management (PIM) provides ... Azure Active Directory privileged identity management provides just enough administration for admins to carry out their work, while minimizing the possibility of security breaches through privileged
16%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
To save users the trouble of configuring a STUN server and then discovering that it doesn't work, SIP providers have extended their proxies to support what is known as Symmetric Response Routing. The IP ... Conventional VoIP telephony doesn't provide for the complications of a firewall. The STUN protocol is the standard fix, but sometimes STUN just isn't enough.
16%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stockbksts, 123RF.com
to provide a way to combine data, thereby allowing processes to be reproduced and relationships between different data sources identified. Other requirements relate to input and output logging and the ability ... Criminals often focus on browsers for various attacks because they are a worthwhile, attractive, and often easy target. However, admins can investigate such attacks with forensic tools that provide
16%
Cloud-native storage with OpenEBS
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
. OpenEBS is an open source product from MayaData, who also provides corresponding offerings with support for enterprise customers. Company founder Evan Powell coined the term "container-attached storage ... Software from the open source OpenEBS project provides a cloud-native storage environment that makes block devices available to individual nodes in the Kubernetes cluster.
16%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
information about advanced configuration is available in easily understandable how-tos. Kolab is one of the few products that provides a cross-platform desktop client in the form of Kontact. Even Windows users ... Microsoft Exchange and Lotus Notes hold onto the big chunks of the groupware market, and social networks are rushing to transform the space. All the same, free software provides an effective
16%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
and various web plugins for Windows Terminal Services, Citrix, Outlook Web Access, and so on. Client-side Vasco provides one-time password (OTP) tokens of various designs under its DIGIPASS brand – for example ... Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present
16%
Native serverless computing in Kubernetes
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Adam Bixby on Unsplash
. In MariaDB, for example, the service would be the active mysqld instance – not because it is a single process, but because this service provides the central function of the database. Several processes might ... Knative transfers serverless workloads to Kubernetes and provides all the container components you need to build serverless applications and PaaS and FaaS services.

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice