Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (272)
  • Article (10)
  • News (10)
Keywords

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 30 Next »

18%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
measurements, allowing you to determine quickly whether requests from provider A's network are answered faster than those from provider B's network. Programmers and administrators are likely to be experiencing
18%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
are assigned by default if the Machine with root privileges box is checked: You will want to change this setting. Now press Create to create the container. The User mode networking option lets you forward
18%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
administrator. The software has been around since 2001 and protects Linux and Windows computers alike. In 2013, this classic tool was acquired by commercial network equipment supplier Cisco, which has not changed
18%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
is made more complicated by the large spectrum of responsibilities that fall under the "operations" roof. Layer models like ISO/OSI graphically document just how far the work of a network administrator
18%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
on the virtual machines that Qemu provides without fighting over the physical network interface (Figure 1). Figure 1: Thanks to KVM, Windows 7 and openSUSE 11
18%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
and individually for each CPU core. Device stats lists misbehaving devices such as network cards and USB adapters. For the network cards, PowerTOP tells you how many data packets cross the network per second
18%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
). Archive incoming and outgoing email by means of network recording or deploying additional smart hosts (appliances) in the email flow. Archive all email (including internal messages) by integrating some
18%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
Many companies use a proxy to handle web access. These intermediaries on the network make it easy to look for viruses on pages accessed by users and in downloads. Company management often requires
18%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
, requires a name, a zonepath (the zone's root directory), and a network interface setup (IP address, physical binding, and default router). Although you can add several other attributes and parameters
18%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
system tools, with the applications updated as containers. Systemd does the rest to ensure that classic sources of error, such as changes to the network configuration of systems, no longer automatically

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice