Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (439)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 221 222 223 224 225 226 227 228 229 230 231 232 Next »

11%
Monitoring with Zabbix
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Les Cunliffe, 123RF.com
of templates, among other things. The PHP program is so intuitively designed and usable that administrators will soon find their way. The main Monitoring menu provides a dashboard as a convenient point
11%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
doesn't stop at this point, sshguard will block the connection for increasingly long periods. This intelligent strategy has the advantage of not accidentally locking out forgetful users, and it provides
11%
Snapshot management for Azure VMs
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © meepiangraphic, 123RF.com
a snapshot before carrying out updates or making major changes to an application can provide a fallback position. If the update fails or has unexpected side effects, you can simply and quickly revert
11%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
be integrated into a common monitoring system. Therefore, established product providers from the IT monitoring sector unsurprisingly also have special IoT agents in their portfolios. One example is Datadog
11%
Moving Your Data – It’s Not Always Pleasant
08.05.2013
Home »  HPC  »  Articles  » 
’ve chosen to go a slightly different route and make each data server on the old storage a seed server, so it will be serving a particular file and no other server will provide for it by creating the correct
11%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
in the Security Log. But if a connection doesn’t work, the log won’t always provide a reason. Cisco IOS For IOS (I used Version 12.2 in my tests), the configuration comprises six elements: An IKE policy
11%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
a “front-end” system to provide things such as I/O functionality. Examples of front-end systems were the Cray C90 or Y-MP. The T3D was something of a sea change for Cray. The first reason is that it moved
11%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
system. The aria_pagecache_buffer_size is similar to this if you use the Aria storage engine provided with MariaDB. InnoDB Parameters Now I'll move on to the most critical parameters for the Inno
11%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
server, so it will be serving a particular file and no other server will provide for it by creating the correct torrent files. Figure 2: BitTorrent layout
11%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
negotations will appear in the Security Log. But if a connection doesn't work, the log won't always provide a reason. Cisco IOS For IOS (I used Version 12.2 in my tests), the configuration comprises six

« Previous 1 ... 221 222 223 224 225 226 227 228 229 230 231 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice