Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 207 208 209 210 211 212 213 214 215 216 217 218 219 220 ... 232 Next »

12%
Monitor your network
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Endrille, Fotolia
and familiarized yourself with the monitors, you can start setting alerts. You can also equip the server with a mail service provider's SMTP settings to receive alerts via email, based on predefined criteria
12%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
, set it up in a conspicuous location to highlight the threats a public-facing machine encounters – and provide a bit of fun. You can also see it in action on YouTube [7]. Infos Target hack
12%
Turbocharge your network with Zeroshell
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Przemyslaw Koch, 123RF.com
. The Zeroshell Linux distribution provides various essential network services ranging from DHCP and firewall to virtual private network (VPN) and load balancing. It has a RADIUS server for WPA2 authentication
12%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
built in an entirely reproducible way since 2012. Gitian [17], a distribution method that offers a deterministic build process in a container or a virtual machine, provides the underpinnings. Using
12%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
that provides granular information about Internet-aware devices. A few years ago, the maintainers of Shodan created an API that allows you and your security software to "plug in" to their database. Various tools
12%
The best performance yet
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lucy Baldwin, 123RF.com
sequential throughput. The 4K Random I/O averaged 4,010 read and 1,019 write I/O operations per second (IOPS). A handy tool maintained by the community for quickly benchmarking storage is provided by Pi
12%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
been made to deal with the problem by providing predictable network interface names [3]. In a similar approach to biosdevname, NICs obtain their names according to their unique location in the (virtual
12%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
by Raspberry Pi this spring [4] (Figure 2). The HAT+ standard format enables automatic detection of the board as well as the device connected through the single M Key edge interface it provides. M2 form factors
12%
Automate Active Directory management with the Python PyAD library
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Eric Issele, 123RF.com
is typically encrypted. If you do not want encryption, manually change the SSL value to False. Managing Users in AD The returned ADUser object provides insights into the settings applicable to the user account
12%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
, and customizations. sections is an array of sections, each of which in turn comprises an array of elements, called items. The developers provide a complete list of all available configuration options [2

« Previous 1 ... 207 208 209 210 211 212 213 214 215 216 217 218 219 220 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice