Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"429 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (259)
  • News (6)
  • Article (4)
Keywords

« Previous 1 ... 20 21 22 23 24 25 26 27

26%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
, the priority that applies to events that match a specific rule in Falco must be defined. From an admin's perspective, the fields for conditions, outputs [6], and priority are of particular interest. Listing 1
26%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
of the failure. Nagios and M/Monit are just two examples of how Alerta can be used in combination with other tools. The documentation [6] has a long list of compatible providers and software projects under
26%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
Bifrost [5] (bye-frost) also has a fairly specific area of application and is now mostly rolled out as part of an OpenStack installation with Kayobe [6]. If you hear the word OpenStack and immediately feel
26%
MAT: Monitor your infrastructure with Netdata
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
is that Netdata has to be operated as a cloud service with proprietary components, although you can run Netdata Cloud on your own infrastructure. The $10,000 or so that an on-premises setup on this scale costs [6
26%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
are in place. If necessary, it will issue an error message and quit. Listing 6 contains a validate function that would work for Asterisk – apart from the sipuri section, this function is very generic, so you
26%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
/3 weight 409600bit allot 1514b level 0 ewma 5 avpkt 920b maxidle 1.6ms Sent 185501283289 bytes 158312905 pkt (dropped 1492, overlimits 451813147 requeues 0) rate 0bit 0pps backlog 0b 0p requeues 0
26%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10
26%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
(PAM) trust [6] to the Red Forest. You might also want to consider the use of smart cards for Red Forest logins and use shadow principals to assign principals from the Red Forest permissions in a Golden
26%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
the computer. Remember that Microsoft hardened the join process with an existing computer object in 2022 and again in 2023 [6], which limits your design options to some extent. Another measure you should

« Previous 1 ... 20 21 22 23 24 25 26 27

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice