Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (75)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

85%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
editor, grep, and a cross-referencer (either cscope [2] or LXR [3]). Although automated source code vulnerability scanners have their place, especially in auditing very large code bases, I haven't found ... 3
85%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
and normally resides in /sbin. In each case, Upstart first sends a SIGTERM signal to the job in question and then waits for the default five seconds. If the job is still running after this wait, Upstart
85%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
a product or to integrate Horde into their own solutions. User Settings Horde isn't just flexible in terms of the server-side configuration but also offers users a number of settings. Compared with Horde 3
85%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
, such as ipv6.google.com. If one of these pings doesn't work, check the server setup, including the default gateway and firewall configuration. Figure 2: ip -6
85%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.com [3] for a video that might help you set up your environment
85%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
than 0 (Figure 3). If not, either the processor doesn't support the special commands, or the commands have been disabled in the computer's BIOS. Users with Intel processors can additionally check
85%
openlava – Hot resource manager
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Konrad Bak, 123RF.com
to pay attention to a few gotchas. (In my first attempt, I didn't pay attention to these.) In the next sections, I'll walk through the installation of openlava on a cluster (the Warewulf-based cluster [3
85%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Helder Almeida, 123RF.com
FA3DA769/656949ebook.pdf Google Apps for Business: http://www.google.com/apps/intl/en/business/index.html The Author Björn Bürstinghaus is a IT administrator with simyo GmbH in D
85%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
"-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN" 04 "http://java.sun.com/dtd/web-app_2_3.dtd"> 05 06 07 08
84%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
of a previous full backup and the subsequent incremental backups. This synthetic backup is identical to a full backup but doesn't entail repeatedly transferring data over the wire. VM backups could involve

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice