Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 176 177 178 179 180 181 182 183 184 185 186 187 188 189 ... 208 Next »

12%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
to leave the maintenance of the application ecosystem to third-party providers of the respective tools. However, in the security context, container-based workloads come with challenges that do not exist
12%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
Version 4 (TCP/IPv4) provide various settings, such as integrating Windows into a Windows domain. The settings are prone to incorrect configurations, so you should check them after setup or if you
12%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
. The ticket screens in version 11 can be customized even more and more clearly than in the past. Dynamic fields can be provided in different orders on different screens and with individual labels. The option
12%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
to your command. When you receive the expected response, you enter another command and so on. Expect works in the same way, except you have to provide the script with commands and expected responses
12%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
provides the vmss2core command for this, but only with the workstation product in versions for Windows and Linux [9]. ESX admins do not have this option. Basically, vmss2core will also work outside
12%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
Name removes it. Inside RADOS One of the explicit design goals for RADOS is to provide seamlessly scalable storage. Admins should be able to add any number of storage nodes to a RADOS object store
12%
Total Network Monitor
20.08.2013
Home »  Articles  » 
 
devices and arrange your equipment to provide a good overview. In map view, you can also add or remove devices, just as in the normal tree view. Integrating Servers and Services To monitor servers
12%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
provides easy management of various versions and packages in a dynamic HPC environment. One of the issues, however, is how to keep your Modules environment when you use other nodes. If you use ssh to log
12%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration. Listing 1: Apache Configuration SSLProtocol -SSLv2 +SSLv3
12%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
that will not match the available antivirus signatures. The Metasploit penetration testing framework provides a collection of tools you can use to test a network by attacking it the way an intruder would attack it

« Previous 1 ... 176 177 178 179 180 181 182 183 184 185 186 187 188 189 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice