Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 37 Next »

69%
What's new in Ceph
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Domenico Loia on Unsplash
independent enough to withstand even a severe change in the available personnel. Incidentally, some suspect the spin-off of the Storage team from Red Hat to be the start of IBM's Red Hat carve up. This wouldn't
69%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
. Normally, you don't need to limit the packet size, so this option is not set by default. Because in this example, I want to analyze all data traffic, I will not apply a capture filter right now. You
69%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
Infrastructures with oVirt 3.1" by Thomas Drilling, ADMIN Issue 11, pg. 26: http://www.admin-magazine.com/Articles/Managing-Virtual-Infrastructures-with-oVirt/(language)/eng-US VirtSandbox: https
69%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
Protect 4.1.5.10129: Oracle VirtualBox 3.1.0--4.0.6 ShadowProtect 4.2.0.13499: Oracle VirtualBox 3.1.0--4.1.6 System Requirements for the Host You can't just use any old hardware
69%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
. The attachment can then be examined and analyzed before it finds its way to the recipient. Of course, automated systems must have allowlists, but normal users in your company and their counterparts can usually
69%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
, or something of that ilk, then appears. Now you have to create the user and organization – they are essential for managing the configuration data: sudo chef-server-ctl user-create admin tam hanna tamhan@tamoggemon.com
69%
PowerShell for Exchange and SharePoint
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Olexandr Moroz, 123RF.com
Using PowerShell isn't all that complex. You can just type get-command to list the available commands. Very few administrators will be familiar with the full set of command-lets (cmdlets
69%
Operating system virtualization with OpenVZ
28.06.2011
Home »  CloudAge  »  Articles  » 
 
using Linux-Vserver [1], OpenVZ [2], or Virtuozzo [3]. Benefits Hypervisor-based virtualization solutions emulate a complete hardware layer for the guest system; ideally any operating system including
69%
Creating a private Docker registry
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Dayne Topkin on Unsplash
. Because I am using Linux Mint, that command won't quite do what I need, so instead of running that command, I create a file called /etc/apt/sources.list.d/docker.list: deb [arch=amd64] https://download.docker.com
69%
Network monitoring with Zeek
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Susann Schuster on Unsplash
a tool for monitoring large volumes of data with a simple option for analyzing network traffic with self-programmed scripts, known as policy scripts. The name change to Zeek (think "seek") didn't happen

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice