Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (922)
  • Article (319)
  • News (106)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 136 Next »

16%
Windows Server 2012 Administration
07.06.2012
Home »  Articles  » 
 
settings, manage IIS, manage storage, check events, add roles, add features, and much more. Figure 3: Server Manager’s default view, ready to manage your
16%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4
16%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
, Packstack [1] is used for quickly setting up development or demonstration cloud environments. In this article, I present an example of an IaaS-type RDO [2] OpenStack Pike [3] installation using the Packstack
16%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
in practice, because Rancher comes with its own Kubernetes core distribution in tow in the form of K3s, which provides all the features you need. In this article, I guide you through the implementation
16%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
to give you consistent results with a running system. A cleaner approach would be to use an image backup program for Linux, such as Clonezilla [2] or Partimage [3], which means shutting down the system
16%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
://www.mydomain.orgwinget source list Manage sources of packages (e.g., add custom source)List source repositories search find winget search OpenJDKwinget search --query "Python 3"winget search Adobe -s
16%
2014 Intel Parallel Universe Computing Challenge
11.11.2014
Home »  HPC  »  News  » 
 
to reach the final match the afternoon of November 20. This year’s contest again comprises a supercomputing trivia round followed by a parallel computing code challenge. Both components take place live
16%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
is achieved by using commonly installed tools that focus on the user, putting data and possibly information in the user’s hands (and probably the admin’s if an issue crops up). The data can also be used
16%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
with the requested packages. The tool helps you avoid the well-known and feared RPM "dependency hell" problem [3]. DNF works with an existing software repository that contains RPM packages. The repository can
16%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
GKF8S 16 DDR3, Registered, ECC, 4 rank 8.710 0.54 AL24M72E4BKH9S 8 DDR3, Registered, ECC, 2 rank 6.132 0.77 AL12M72B8BKH9S

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 136 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice