Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (475)
  • Article (139)
  • News (41)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 67 Next »

43%
U-Move backs up, restores, and migrates Active Directory environments
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Erda Estremera on Unsplash
migration. Before I proceed to investigate whether the manufacturer actually keeps this promise, just one more note: The primary purpose of Windows Server Backup and of U-Move is restoring domain controllers
43%
High Availability without Pacemaker
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © madpixblue, 123RF.com
. The logical router has both a virtual MAC and a virtual IP address, and one member of the VRRP pool always handles the actual routing based on the given configuration. Failover is an inherent feature
43%
Nagios Passive Checks
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Lisa Young, 123RF.com
have no guarantee that the script actually executed. If the script crashes or aborts before the line that sends the email notification, you will never know. A far better solution is to let Nagios  [1
43%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Rgbspace, Fotolia.com
R is implemented using Bash scripts might make it seem unpolished, and yet, ReaR is actually highly professional. The small size of the Bash scripts, which are usually not longer than one screen page, also makes
43%
Troubleshooting Kubernetes and Docker with a SuperContainer
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Sergey Nivens, 123RF.com
the internal IP address. I could see TCP port 80, which HTTP runs on, but I need to confirm that I am actually seeing the correct network stack from outside the target container. This time I work from the host
43%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
the developments of a metric value calculated by Prophet or Fourier with the actual state. Ideally, thanks to the trained models in PAD, you will notice very quickly that something suspicious is going on (Figure 2
43%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
configuration is installed once only – presumably along with a certificate – on a user's smartphone or PC to provide the return channel to the corporate network. Does anyone actually check whether the certificate
43%
Best practices when working with Docker images
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Ilse Orsel on Unsplash
and containers more efficient. Be Careful with the "latest" Tag Despite its name, latest doesn't mean the image tagged as such is actually its most recent version – it's just the default value assigned
43%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
campaign are created, it's time to create a template, which is the actual phishing email or, more precisely, its content. To do this, go to the Email Templates menu. You can import existing email content
43%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
in the scope of incident analysis (i.e., dealing with the actual malware infection). Security Providers as a Source The result of an analysis often comprises a technical description of the findings

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice