Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 37 Next »

76%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
://fedoraproject.org/wiki/Features/Eucalyptus OpenStack in Fedora 18: http://fedoraproject.org/wiki/Features/OpenStack_Folsom Video OpenStack strategy: http://tinyurl.com/ksp5w7b Deltacloud: http://deltacloud.apache.org Red Hat Enterprise
76%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
. Figure 6: Using the Redline Strings output to look for additional evidence of malware. Understanding normal activity is key when you start looking for badness. If you don't know what normal traffic
76%
Give your servers the once over with Nmap
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© ragsac, 123RF.com
ADDRESS [Cut first seven hops for brevity] 8 10.59 so-4-2-0.mpr3.pao1.us.above.net (64.125.28.142) 9 11.00 metro0.sv.svcolo.com (208.185.168.173) 10 9
76%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
-command(config-manager)' && \ dnf clean all STOPSIGNAL SIGRTMIN+3 CMD ["/bin/bash"] The Footloose configuration shown in Listing 2 uses the locally created rocklinux8 image with docker build . -t rockylinux8 Listing 2
76%
Microsoft Exchange 2010: The Highlights
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© peapop, Fotolia.com
, which wasn't possible in previous versions (Figure 2). Figure 1: Wizard for creating new certificates
76%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
backend3.example.com server; 05 backend4.example.com server down; 06 backend5.example.com backup server; 07 } 08 09 upstream fallback { 10 fallback1.example.com server: 8081; 11 } 12 13 14 server { 15 % 16
75%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
. Many administrators in production environments only know it as the colorful virt-manager front end, which manages virtual machines on Qemu/KVM. However, virt-manager isn’t even part of the libvirt
75%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
in your prized archive of ADMIN back issues [3]. Table 1 sums up the capabilities of this versatile tool, which include memory use, basic network benchmarks (packet counts), filesystem I/O operations (read
75%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
 for brevity]            8   10.59 so-4-2-0.mpr3.pao1.us.above.net (64.125.28.142)            9   11.00 metro0.sv.svcolo.com (208.185.168.173)            10  9.93  scanme.nmap.org (64.13.134.52)            Nmap
75%
Optimization and standardization of PowerShell scripts
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Kheng Ho Toh, 123rf.com
were typically developed by administrators to support their work. Their understanding of the use of the application as something fairly personal also affected the applied standards: In fact, there weren't

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice