Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (45)
  • News (3)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 Next »

36%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
. Listing 1 DRBD Resource for VM # vi /etc/drbd.d/proxy.res resource proxy { device drbd0; disk /dev/drbd/proxy; meta-disk internal; on alice { address 10.42.0.100:7789; node-id 0
36%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
.2-2 Community Edition used for this test is also available in a 32-bit version and as a virtual machine image. According to the Zentyal roadmap, version 3.0 was about to be released at the time of testing
36%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
on YouTube (https://www.youtube.com/watch?v=GfH4QL4VqJ0), features accounts from Guido van Rossum, Travis Oliphant, Barry Warsaw, and many others. It tells "the story of Python's rise, its community
36%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
are guessed by one of many automated attack methods. As well as being able to take individual IP addresses, hosts.allow can happily handle the CIDR notation of classless IP address ranges, such as: sshd: 10.10.10.0
36%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
, or spot purchase of resources. Generally, the cost for on-demand EC2 instances are as follows: Quadruple Extra Large Instance is US$ 1.3/hour (US$ 0.33/core per hour), Eight Extra Large Instance is US$ 2
36%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
computer room. Table 1 Three Storage Clouds in Comparison Feature ownCloud Dropbox Synology Cloud Station Version 4.0.1 – Beta
36%
Bottom: The new top
07.10.2025
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Lucy Baldwin, 123RF.com
test, hovering around a remarkably low 0.5% (Figure 9). Figure 8: bpytop looking the same as Bashtop, but 75% less hungry for CPU cycles
36%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
ADRecon Prerequisites .NET Framework 3.0 or newer (included in Windows 7 and later) PowerShell 2.0 or newer (included in Windows 7 and later) AzureAD PowerShell Module 3.0 or newer – installable
36%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
): { echo -ne "HTTP/1.0 200 OK\r\n\r\n"; \ cat filename.tar.gz; } | nc -l -p 15000 Be warned that this might not work for you, but with some trial and error, to enable some extra interaction, you could try
36%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
to the root user. If you want to check all files, you can set scan_ignore_root="0" in the conf.maldet configuration file to check the entire database. When maldet needs to scan large areas of the filesystem

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice