Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (251)
  • Article (82)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 34 Next »

46%
Monitoring IPv6 with Wireshark
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Suzanne Tucker, 123RF.com
and is usually expressed as eights sets of four hexadecimal digits (known as nibbles, quibbles, or hextets) separated by colons. For example, an IPv6 address looks like this: 2001: 0db8: 1010: 61ab: f005: ba11: 00
46%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
and the web applications must support. Authelia also acts as an OpenID Connect 1.0 provider, with authentication based on tokens. Although this function was still in beta when this issue went to press, it has
46%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
, the problem of writing a dump to an MD RAID or transferring larger kernel images ultimately proved unfixable. Further attempts with Netdump (Red Hat) or Diskdump [3] in 2002 and 2004 also had only moderate
46%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
='y' clause along with the create table statement: mysql> create table testTB (c1 INT) encryption='y'; mysql> alter table testTB encryption='y'; Query OK, 1 row affected (0.33 sec) Records: 1 Duplicates: 0
46%
Goodbye cloud VMs, hello laptop VMs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Liubomyr Feshchyn, 123rf.com
to the launch command. For example, the command multipass launch -n mycloudvm -c 2 -m 2G -d 10G --timeout 600 Table 1 Multipass launch Argument Action (v1.8.0 default) -n
46%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Live CD [5]. The basis for the approach described there is Ubuntu 12.04 (Precise Pangolin) with ADeskBar version 0.4.3. The latter is the Python-/Gtk-based application launcher for Openbox, on which
46%
Monitoring changes in Active Directory with built-in tools
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Tobias Tullius on Unsplash
the Microsoft Security Compliance Toolkit 1.0 [1] can help you with this question. After unzipping the archive file, you will see a Group Policy Objects (GPOs) backup folder, which you can import in the Group
46%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
the Downloads page to a mirror, you might be overwhelmed by the list of innumerable files (Figure 1). Normally, however, all you need is the approximately 100MB ISO image, pfSense-2.0-RELEASE-i386.iso.gz, from
46%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
Server using, say, Nagios. The close link between Citrix and Microsoft is demonstrated by the availability of graphical management tools. Basic management tasks on the host system (Dom0) can be handled using
46%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
between Citrix and Microsoft is demonstrated by the availability of graphical management tools. Basic management tasks on the host system (Dom0 ) can be handled using the Curses-based xcconsole and the xe

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice