Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • Article (25)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 Next »

29%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
         mkfs.bfs     mkfs.cramfs  mkfs.ext2    mkfs.ext3    mkfs.ext4 mkfs.fat     mkfs.minix   mkfs.msdos   mkfs.ntfs    mkfs.vfat These are the filesystems I can use with the mkfs  command on this system. If you want to build other
29%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
(instead of containers) to separate the different virtual machines securely. OpenShift v3, which is still in beta and was presented at DevConf 2015 Figure 2 [3], integrates Docker technology and Google
29%
Chef users faced with a license change might find solace in a new open source distribution, Cinc.
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Pascal Bernardon on Unsplash
all of its proprietary tools under a free license – or at least the source code for them. Here's the rub: At the same time as changing the license of the source code of various tools, Progress Software
29%
Open Virtual Desktop 3.0 as an alternative to VDI
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Oksana Bratanova, 123RF.com
3.0.3, which is mature enough for admins to consider as an alternative to a full-fledged virtual desktop infrastructure (VDI) solution. As a "free desktop virtualization solution," the GPL ... Open Virtual Desktop 3.0 as an alternative to VDI
29%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
, Packstack [1] is used for quickly setting up development or demonstration cloud environments. In this article, I present an example of an IaaS-type RDO [2] OpenStack Pike [3] installation using the Packstack
29%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
in which applications run. These containers are lean because they share the same kernel but are executed in separate run-time environments, thanks to cgroups [2] and namespaces [3], which define which
29%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
and right. Unfortunately, my laptop has a 16:9 display with a resolution of 1,600x900 pixels. Common Denominator Some research on the topic of screen resolution reveals the root cause: the maximum
29%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
take both a host-based and network-based approach. The suite uses three tools for host-based intrusion detection: (1) Wazuh [3] is a fork of the OSSEC [4] intrusion detection system; it monitors hosts
29%
Review: Accelerator card by OCZ for ESX server
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© gortan123, 123RF.com
on the iSCSI network, reaching a total of 500MBps. At 500MBps, the going would start to get tough, even for SATA 3.0 (and even older versions running at 150 and 300MBps would have long since given up
29%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
records are flushed. 3. The system halts. Hackers may hope to see results 1 and 2, because the resumption of broadcasts gives the intruder a chance to capture sensitive information. You can check

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice