Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 186 Next »

13%
Flatpak, Snap, and AppImage
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Quino Al on Unsplash
of the technology. However, there is a solution one size smaller. Youngsters The introduction of the DEB [2] and RPM [3] package formats coincided with the birth of the major distributions Debian and Red Hat
13%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
Diagnostic settings under the Monitoring section (Figures 2 and 3). Here, you add a new diagnostic setting, name it, choose the logs and metrics you want to collect, and specify the Log Analytics workspace
13%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
in such a case (Figure 3). To do this, permanently active loopback interfaces are used as update sources. These interfaces are then also stored on the remote station as peer addresses and included in the remote
13%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
KeePass [2] or KeePassX [3], where all of their passwords are stored in a file and encrypted with a personal master password, so that no one else can access it. With this approach, passwords can
13%
The 12 best tricks for Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Graphic Designer, Fotolia.com
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick 3 Virtual Domain Controller -- Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
13%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
the Linux process [3] in more detail. To check which components need to be installed and to update the framework to the latest version, enter: flutter doctor -v flutter upgrade The recommended development
13%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
bytes:215392635 (215.3 MB) TX bytes:1759757 (1.7 MB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK
13%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
on five hits on the web stack (assuming you pushed all static assets to S3 or something static), the probability that each user is affected by a 1 percent failure rate (i.e., 100 percent minus availability
13%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
your server against attacks. Figure 3: How to ignore certain ports whilst using the Advanced modes. To Ignore or Not to Ignore The next parameters
13%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
Leaving DiskPart... C:> The preparative work on the USB drive is complete. Gathering the Utilities Now you need to download the Windows Automated Installation Kit (AIK) for Windows 7, named KB3AIK

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice