Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (279)
  • News (8)
  • Article (7)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 30 Next »

25%
IP Fabric 7.0 Released
21.02.2025
Home »  News  » 
 
IP Fabric has announced the 7.0 release of its Automated Network Assurance Platform, which aims to provide the necessary insight and control to manage complex cloud, security, and network ... IP Fabric 7.0 Released
24%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
1 1 0 Backup 50 1 1 1 Network printer 100 1 0 0 File server 50 1 1 0
24%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
) or Link Layer Discovery Protocol (LLDP). Disable Internet Protocol (IP) source routing. Disable Secure Shell (SSH) version 1. Ensure only SSH v2.0 is used with the following cryptographic ... In the news: Hetzner Announces S3-Compatible Object Storage; Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure; OpenMP 6.0 Released; Open Source Development Improves
24%
Maatkit tools for database administrators
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
tiero, 123RF
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of 22 seconds to answer
23%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
/2001/XMLSchema-instance" 05 xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-2.0.xsd 06 http
23%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2
23%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
based on Windows. Bye-Bye Windows Although the Red Hat developers ported all the components of the management component, RHEV-M, from C# to Java in RHEV 3.0 [1], use of the Administrator Console
22%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
Windows versions from NT 4.0 and the current versions come with the msinfo32 command-line program, which reports a first look of the machine hardware. The program offers a good overview of the available
22%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
active_checks_enabled 1 22 passive_checks_enabled 0 23 check_command check_ssh 24 max_check_attempts 3 25
22%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple

« Previous 1 2 3 4 5 6 7 8 9 10 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice