Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (187)
  • Article (79)
  • News (10)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 28 Next »

44%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
abuse of these devices by malware, it was necessary to disable this kind of access [3]. To remove this restriction, you need to rebuild the kernel without CONFIG_STRICT_DEVMEM , but this approach
44%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
and others with RHEV 3.1, because the Red Hat developers needed to replace proprietary code elements (C#) with open source code over the years. A typical RHEV environment consists of one (or more) hypervisor
44%
Wireshark
27.11.2011
Home »  Articles  » 
 
that the administrator can evaluate later. One particularly impressive thing about Tcpdump is its useful collection of filters. These capture filters are based on Libpcap, a C/​C++ library that supports access
44%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
– not just those manufactured by Seagate. You can find the Seatools and other information for rescuing hard disks online  [2]. Western Digital Data Lifeguard is a similar tool [3], which is also available
44%
Monitor Active Directory with Azure AD Connect Health
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © skaisbon, photocase.com
2008 R2 Active Directory Federation Services (AD FS) servers and DCs. The service does not target companies that do not use Microsoft Azure and Azure AD, however. Where organizations synchronize
44%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
-package-update-upgrade-install using lock (c-fcdd-4c36-ba88-275b78e546a7/sem/config_package_update_upgrade_install'>) ... 2018-10-17 21:54:06,988 - helpers.py[DEBUG]: Running update
44%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
templates for group policies (Figure 1). Figure 1: Tools such as Security Compliance Manager (now retired [3]) made it possible to operate AD environments more
44%
Keeping Azure VMs up to date
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Brian Welker, 123RF.com
of support (e.g., for Windows Server 2008/2008 R2 and Windows Server 2012/2012 R2) for up-to-date Azure VM operating systems have been free thus far. This point is interesting because even if companies use
44%
System Center 2012 SP1: What's new?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
snvv, 123RF
2 and v3 (PA-RISC and IA64) Oracle Solaris 9 (SPARC) and Solaris 10 (SPARC and x86) Red Hat Enterprise Linux 4, 5, and 6 (x86/x64) SUSE Linux Enterprise Server 9 (x86), 10 SP1 (x86/x64
44%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
on Linux hosts running RHEL or Fedora. Red Hat only achieved a concept comparable to VMware and others with RHEV 3.1, because the Red Hat developers needed to replace proprietary code elements (C#) with open

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice