Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (108)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

43%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
, most likely, (3/2) x 15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s 20 instructs sshguard
43%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
notification_interval 60 16 notification_options d 17 } 18 19 # Fileserver 20 define host{ 21 host_name fileserver 22 alias Fileserver 23
43%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
20 21 22 23 24
43%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
:web1> commit 20 zonecfg:web1> exit The next step after configuration is to install the zone, which takes the information from your configuration file (/etc/zones/web1.xml ), creates default
43%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
and documentation on the topic of server performance monitoring. If you manage a complex structure, it's good idea to read the guides on this site. To run the tool, you also need Log Parser 2.2 [2], which is also
43%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
) or Link Layer Discovery Protocol (LLDP). Disable Internet Protocol (IP) source routing. Disable Secure Shell (SSH) version 1. Ensure only SSH v2.0 is used with the following cryptographic
43%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
launched nary 20 years ago (Figure 1). Its underpowered early Atom CPU cannot support a modern graphical environment, but the intended use as a terminal in init 3 mode moots that concern entirely. Sadly, I
43%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
of the applications (22 percent) of the firms surveyed are currently hosted in the cloud. Additionally, 28 percent of testing now occurs in a cloud environment, and the report forecasts this to increase to 39 percent
43%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
ports on www2.haribo.com (213.185.81.67): Not shown: 995 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp? 22/tcp open tcpwrapped 80/tcp open http Apache httpd |_ html
43%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
, specifying the relationships between projects, their build configurations (e.g., Debug or Release ), and target platforms (e.g., Any CPU or x64 ). The file also stores global solution settings, including

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice