Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e100】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 185 186 187 188 189 190 191 192 193 194 195 196 197 198 ... 216 Next »

42%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
, but before I look a little closer at that application of htaccess, I'll run through some other practical examples. One 2011 study shows that the behemoth that is Apache is running more than 60% of websites
42%
Monitoring with Zabbix
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Les Cunliffe, 123RF.com
, the front end, and the agent. The acquired data can be viewed by any Zabbix user with appropriate authorization via the browser front end. The server and the web front end don't need to run on the same
42%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
individual traffic production cycles, the tool takes breaks of several seconds. It also measures its own running time and can record and reproduce its own activity. Multiple smbtatorture processors can run
42%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
; will run on 2GB but will be very slow with Proxy Servers attached 30GB of disk space per (Software) channel; separate partition /var/satellite/ 12GB of disk space for embedded database; separate
42%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
The most common operating systems on the LAN are Windows, Linux, and Mac OS X. They all run IPv6 in parallel with IPv4. IPv6 is enabled and active by default, and the systems on the network communicate via
42%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
, such as unsecured ports or extensions. In another scenario, assume a user cannot log in to the SIP server; in this case, you would run the commands sipsak -s sip:192.168.1.103 sipsak -U -s sip:100@192.168.1.103 -u
42%
Snapshot management for Azure VMs
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © meepiangraphic, 123RF.com
be used for Ultra Disks and Premium SSD v2 disks. You can create up to five disks simultaneously from a snapshot, with up to three in the queue while a background copy is running, which means you can define
42%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
Ra Basics Station open source software package must be running on the gateways. Figure 3: With AWS IoT Core, LoRaWAN gateways can connect directly to the cloud
42%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
trivial. It usually takes a while for the software to run smoothly, and you would be well advised to plan the Foreman setup in advance. In any case, the ideal time for implementation is at the start
42%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
to run in the local setup, the AI capabilities are stored in the cloud. European customers can see potential trouble: Coroot intervenes deeply with the data flow of the systems it is intended to monitor

« Previous 1 ... 185 186 187 188 189 190 191 192 193 194 195 196 197 198 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice