Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (55)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 Next »

8%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
:00AM" # Define the action that the task should perform $action = New-ScheduledTaskAction -Execute "powershell.exe" -Argument "-NoProfile -WindowStyle Hidden -File $scriptPath" # Optional: Define task
8%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
the underlying organization of a Warewulf cluster by showing: List of nodes to provision Configuration profiles that may be applied to those nodes Operating system images to provision to those nodes
8%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
Memory interface test hardinfo2 System profiler and benchmark tool for hardware and software inxi Discover hardware details Network Tools Nmap Network
8%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
flags [5]. As soon as DNF is installed, you should update root's .profile (or the .kshrc file, or both) to update the $PATH environment variable to include the location of the DNF (and other OSS
8%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
Servicing and Management (DISM), and create Windows PE images. Additionally, you can use the User State Migration Tool (USMT) in AIK to migrate user profiles and data. Windows AIK also contains the "Volume
8%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
instructions. The filename is specified by the -f (file) parameter: smbtaquery -h Host -i 3491 -f commandfile.txt In profile and interpreter mode, each command must be separated by a comma and parameters
8%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
profiles and user information are stored on the single full-version Satellite Server. The proxy acts as a go-between for client systems and Satellite Server. When a patch is released from Red Hat
8%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
/Monit-style configuration is: check process httpd with pidfile /run/httpd/httpd.pid if 2 restart within 3 cycle then exec "/usr/local/bin/alerta --config-file /etc/alerta.conf --profile production send --resource Rocky9
8%
A Btrfs field test and workshop
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Adrian Hillman, 123RF.com
for the data. Different profiles can be selected for both metadata and payload data: Single RAID 0 RAID 1 RAID 10 For RAID 0 and RAID 1, you need at least two block devices; for RAID 10
8%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
. As Figure 9 shows, a non-zero think time improves the throughput profile quite dramatically. (12) This trick with the think time reveals the existence

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice