Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (642)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 78 Next »

13%
Unifying events with Splunk
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sebastian Duda, 123RF.com
's recommendations [7]. 1. Via splunk | Manager | Apps , select Create app . 2. Name and label should logically be OSSEC . 3. Choose the Yes radio button to make the app visible and describe the app as OSSEC ... Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.
13%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
MB_nor/s rMB_dir/s wMB_dir/s rMB_svr/s wMB_svr/s ops/s rops/s wops/s 192.168.1.250:/home 1230649.19 1843536.81 0.00 0.00 1229407.77 1843781
12%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
-in package managers. Table 1 Rsync vs. Rclone Feature Rsync Rclone License GPLv3 MIT Intended use Data backup between two computers or servers ... You don't need native clients for every single service just to back up or synchronize your data in the cloud; Rclone helps you handle these tasks for multiple cloud accounts at the command line
12%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
be prompted to use MFA or dragged by a rule into Microsoft's cloud proxy, which blocks all downloads in the session and prevents data leakage. The employee can then access the data – after carrying out an MFA ... cloud software and data storage or running domain controllers or core applications in the cloud.
12%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
, making it easy to create a new DB instance with updated software, into which you then only insert the existing dataset – all done. Infos Backing up with an S3 client: https://aws.amazon.com ... In cloud computing practice, backups are important in several ways: Customers want to secure their data, and vendors want to secure the essential details of their platforms. Rescue yourself, if you
12%
Web applications with Flask
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Photographer, 133RF.com
Flask uses by default. WSGI [3] is a specification that defines how a web server software and a web application written in Python communicate. This could be the Apache or Nginx web server with their WSGI ... Django is often used for creating Python web applications, but a lesser known option called Flask can offer more flexibility. In this article, we will take a closer look at Flask.
12%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
user for the first time. The following command parses the LDIF file: $ ldapadd -x -W -D cn=manager,dc=acme-services,dc=org -f base.ldif Notice that now this command no longer needs the root user ... Centralized user management with LDAP or Active Directory is the standard today, although many prefer to manage user data manually rather than build this kind of infrastructure. In this article, we
12%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
the wheat from the chaff. Games Without Frontiers A few years ago, an archetypal demo setup, in which players of the 3D first-person shooter Quake 3 didn't even notice that the VM and its server had moved
12%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
administrators, we continue to reinforce Linux as the bedrock for enterprise digital transformation." For more information about Red Hat Enterprise Linux 8.3, read the official release notes (https://access.redhat.com ... In the news: Red Hat Enterprise Linux 8.3 Available, It's Official – Linux 5.10 is the Next LTS Kernel, System76 Unleashes World's Smallest Quad-GPU Workstation, Canonical Releases Autonomous
12%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
) "Netjoin: Domain join hardening changes" Microsoft KB5020276, last update August 2024: https://support.microsoft.com/en-us/topic/kb5020276-netjoin-domain-join-hardening-changes-2b65a0f3-1f4c-42ef-ac0f-1caaf ... Active Directory default settings could expose your AD environment to security vulnerabilities. We look at account hygiene and risk mitigation in authentication, login data, PKI, domain join

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice