Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (274)
  • Article (8)
  • News (5)
Keywords

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 29 Next »

10%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
tab before clicking Enable folder redirection to the server and checking the box for each folder that clients should redirect to the server (Figure 5
10%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
the Configure button and select Virtual LANs as the tunnel type (Figure 5), then set the tunnel medium type to 802 . The tunnel PVT group ID defines the VLAN. Enter the value of the VLAN for full access here (e
10%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
by monitoring various processes. Standard plugins such as check_procs [5] and the CheckProcState module in NSClient++ [6] help you do so. Thus, you can monitor the maximum number of instances of a specific
10%
Managing VHD devices
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Roman Smitko, 123RF
option for the VHD. bcdedit /copy {current} /d "Booting Windows from a virtual partition" The preceding commands will copy an existing boot configuration and add an entry for booting from VHD (Figure 5
10%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
with their login times (Figure 5). Also, you can see who is accessing a share on the server. If you launch the tool with the username as an argument, it will investigate all the computers in the network environment
10%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
this profile to the first folder in the tree structure and then create more subfolders below this level, to which you assign additional profiles to modify the resolution (Figure 5
10%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
of the network adapter) belong to which VLAN ID card (Figure 5). After doing so, you can launch the Virtual Network Manager in the Hyper-V Manager and select the network connection you want to bind to the VLAN
10%
Intelligent Stack
07.12.2025
Home »  Articles  » 
Lead Image © antoinepham2903, 123RF.com
. Figure 4: A-Tune software architecture. Another tool, etmem (Figure 5), organizes memory into tiers, automatically routing hot data to high-speed DRAM and cold data to low-speed media. Hybrid Storage
10%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
experience. Years of coding experience (all respondents): 1-5 years (13.9%) 6-10 years (21.1%) 11-15 years (15.6%) 16-20 years (11.8%) 21-30 years (14.6%) 31-40 years (7%) 41-50 years
10%
Automating Migration to openEuler
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Chris Briggs on Unsplash
Euler will manage the target servers over an SSH connection, and both password- and keyfile-based authentication are supported (Figure 5). Figure 5: Servers can

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice