Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"5432 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (267)
  • News (5)
  • Article (4)
Keywords

« Previous 1 ... 21 22 23 24 25 26 27 28

26%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
of the failure. Nagios and M/Monit are just two examples of how Alerta can be used in combination with other tools. The documentation [6] has a long list of compatible providers and software projects under
26%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
Bifrost [5] (bye-frost) also has a fairly specific area of application and is now mostly rolled out as part of an OpenStack installation with Kayobe [6]. If you hear the word OpenStack and immediately feel
26%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
are in place. If necessary, it will issue an error message and quit. Listing 6 contains a validate function that would work for Asterisk – apart from the sipuri section, this function is very generic, so you
26%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10
26%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
(PAM) trust [6] to the Red Forest. You might also want to consider the use of smart cards for Red Forest logins and use shadow principals to assign principals from the Red Forest permissions in a Golden
26%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
the computer. Remember that Microsoft hardened the join process with an existing computer object in 2022 and again in 2023 [6], which limits your design options to some extent. Another measure you should

« Previous 1 ... 21 22 23 24 25 26 27 28

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice