Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 75 Next »

16%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
/type-support-working-with-sudo-logs-in-syslog-ng-4-0 The Author Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product
16%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
Certificate Services (AD CS; Microsoft's implementation of an enterprise PKI). The first systematic discussion of AD CS vulnerabilities that lead to the compromise of AD DS is mentioned in an article [3
16%
Windows updates and patch distribution without WSUS
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Rob Thompson on Unsplash
is essentially a cloud-based service. This setup leads to relatively high bandwidth requirements. If the Windows Delivery Optimization feature [5] is not set up correctly, each client will download its own update
16%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
after the second call. The function call between the write calls does not interfere if its byte area does not overlap the written areas (Figure 5). Any function not overlapping the written areas leads
16%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
above the available memory (Mem total ), then your RAM is overcommitted, which can lead to swapping at full load, thereby slowing down the system. To discover the presence and extent of system
16%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
a problem in enterprise setups. OpenStack and Ceph Basics How exactly cloud operators manage the OpenStack and Ceph installation is left up to them; all roads lead to Rome, as they say. From the Open
16%
VMware Tools
15.10.2013
Home »  Articles  » 
shifted from hypervisor level to interoperable management solutions, which requires support for rival hypervisor systems and, as a general rule, leading manufacturers of cloud APIs. The company recently
16%
Rex
19.02.2013
Home »  Articles  » 
fails, which leads to the cryptic error message at the end of the results, among other things. However, the second computer reveals its uptime. To avoid excessive typing in the case of more complex
16%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
of while not and loop instead of while true . The CoffeeScript programmer also can make variable assignments within an expression, which leads to funny lines like: = seven (five = 5) + (two = 2
16%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
as the ID and executes a ceph -w command with this ID using the appropriate keyring. Incidentally, letting users omit the leading ‘client. ’ from their IDs is a CephX convention that has to do

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice