Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (312)
  • Article (8)
  • News (4)
Keywords

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 33 Next »

17%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
connections on a domain controller in real time on a GUI (Figure 1). As one of Microsoft's Sysinternal tools, it is also for download [4]. Use of the tool is similar to two other Sysinternal tools: Regmon
17%
ratarmount Archive Mount Tool
07.09.2025
Home »  Articles  » 
to build the index. Listing 3: Archive File Content (base) laytonjb@laytonjb-MINI-S:~/DATA_STORE$ ls -s total 31400 4 DATA1 240 data1_08022025.tar.gz.index.sqlite 31152 data1_08022025.tar.gz 4 DATA1_WRITE
17%
Hyper-V 3.0 in Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Nico Smit, 123RF.com
Advanced Features : DHCP guard and Router guard prevent uncontrolled use of virtual servers as DHCP servers or routers (Figure 4). This is to prevent virtual servers from undesirably acting as a DHCP server
17%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
various data off the virtual server to different directories or moving all of the server data, including the virtual disks, to a common folder (Figure 4). If the virtual hard drive on a virtual server
17%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
as a heavyweight when unpacked, in both the literal and figurative sense of the word. With its significantly larger color touchscreen (14.5cm diagonal, 480x640 pixels) (Figure 4), a quiet fan, and more than two
17%
Security compliance with OpenSCAP
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitriy Pchelintsev, 123RF.com
and configured in a secure way. For this type of environment, you will probably want to use the popular security guides or checklist issued by the NSA [3] or the Defense Information Systems Agency (DISA) [4
17%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
or she can install a keylogger to record the user's input. Some keyloggers take the form of small adapters that you can install between the keyboard and the PC (Figure 4). They are invisible to antivirus
17%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
(Figure 4). The data entry employee thus has a view of what has been typed from the sheet for the current key and can identify any errors. Figure 4: Fuel
17%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
in Python standard document PEP 282 [1] and has documented the implementation on his own website [2]. The developer put much thought into his work and was inspired by Java's log4j, among other things
17%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
. As you can see in Figure 4, many vendors have uncovered the file. Figure 4: Twenty-seven hits by antivirus vendors. In the hope of achieving a better

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice