Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 199 200 201 202 203 204 205 206 207 208 209 210 211 212 ... 261 Next »

36%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
Monitor on the Exchange server; you can launch it by typing perfmon.msc. Then, click on Performance Monitoring . Click on the green plus sign to create a new counter. If you want to monitor the server
36%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
new ones, administrators must identify which parts of the configuration process can be abstracted or fully automated. Broader architectural strategies include implementing mutable images, remote client
36%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
is to link the new schema to your directory tree to create entries for storing the certificates and metadata so that GnuPG can find the data. To do so, edit the downloaded gnupg-ldap-init.ldif file and replace
36%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
– with email and Microsoft Teams, it is exactly the opposite. Manage Users The logged-in administrator can do and see everything. A new user is created in the web GUI in the Users area and is assigned
36%
Container compliance with dockle
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
the image again unless a new image ID doesn't match what is saved locally. Figure 1: Detailed output from an NGINX scan with dockle. The output reveals
36%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
takes action to align the actual state with the desired state, which could mean deploying a new version of an application, scaling the number of pods, or even changing a configuration setting. In essence
36%
Integrating AWS Cloud Services with Your Custom Apps
21.01.2014
Home »  Articles  » 
and Access Management (IAM). In the Users section of the IAM Management Console, you can go to User Actions and select Manage Access Keys to generate a new passkey (Figure 1
36%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
, create a new policy of the Learning Mode type and link it with the database at the same time if so desired. The acquired database queries are stored in a query group during the learning process; you can
36%
Configuration Management with puppet
30.04.2013
Home »  Articles  » 
 
, you can litter the server with all the files you need but keep the best settings in one place: in your puppet project. This technique is hugely useful for deploying to new servers and tracking changes
36%
Virtual Desktop
25.08.2011
Home »  Articles  » 
 
not provide enough functionality to deliver new types of content such as rich multimedia. If you add client-side software to achieve this, then you re-introduce management headaches into these endpoints

« Previous 1 ... 199 200 201 202 203 204 205 206 207 208 209 210 211 212 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice