Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1124)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 157 Next »

13%
Tinkerbell life-cycle management
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Bee Felten-Leidel on Unsplash
-party vendors are also trying to grab a piece of the pie, one of them being Foreman, which enjoys huge popularity. Early Efforts Debian Installer has offered preseeding from the start for hardware
13%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
of Microsoft recommendations and templates. Securing the Host and Operating System Minimizing the attack surface is an important security foundation, and it starts with installation. In general
13%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
.6.2 and the massively revised Anaconda installer. Under the surface lies a whole series of innovations of interest to ambitious users and administrators. A Choice of Desktops From the perspective of admins
13%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
, the next step usually is to install a remote access tool (RAT) that is handled by a command and control system. At this stage, an attacker can establish permanent access to the infected system and other
13%
Sync identities with Microsoft Identity Manager
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © alphaspirit, 123RF.com
the service remains the same at its core. If you install Azure AD Connect, then a version adapted to Azure AD ends up on the intended server to handle the user information in Office 365. Structure
13%
Five free wiki platforms reviewed
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Mariia Zakatiura on Unsplash
For this article, I roll out the wiki applications and databases as containers with Ansible playbooks on a Podman host. To prevent multiple parallel installations fighting for the web or MySQL port on a single IP
13%
Real-time monitoring with Graphite
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkov, 123RF.com
is backed up by a number of daemons that form the storage back end. A simple Graphite installation typically only uses one daemon (carbon-cache.py). For larger environments, the carbon-relay.py and carbon
13%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
or other personalizations on installation. Although you can install applications on the disk, you have to sync your purchased apps manually. What you get is a fully functional Windows 8 system that
13%
Monitor Windows systems and Linux servers
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Shao-Chun Wang, 123RF.com
in the installation, you will first need to spend a little time acquainting yourself with monitoring. A business account with Microsoft is required (e.g., one that is used for Azure or Office 365). As soon as you have
13%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
better suited for backing up data to the cloud. The learning curve is manageable because the tool is based on Rsync syntax (Table 1). Rclone can be easily installed on most popular distributions with built

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 157 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice