Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (154)
  • News (97)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 96 Next »

12%
What's New in NetworkManager
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Anukrati Omar on Unsplash
for some time, many administrators still appreciate the flexibility that NetworkManager offers. The tool is especially convenient when you use a laptop and switch between different wireless local
12%
Orion software development environment
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © route55, 123RF.com
. If you just want to try Orion out, you can install the package locally – which is also the preferred option for laptop users without stable network access. The Eclipse Orion ZIP package is available
12%
All you ever wanted to know about hard drives but never dared ask
16.05.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
of the 4ms a 7,200rpm unit delivers – to 2ms. My laptop's older SSD comparatively delivers a 0.2ms average access time. More significant facets of enterprise disks lie in their different firmware behavior
12%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
can be solved. On desktop systems, an applet also provides information on whether access was blocked by SELinux. Malware Protection We also have a family laptop in the living room; my wife and son
12%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
, I'll examine the response of my laptop to: watch cat /proc/loadavg 0.03 0.03 0.07 1/362 23038 This is what an idle system looks like. When examining load average numbers, you should also be aware
12%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
and operating a platform requires additional software, including operating tools – life-cycle management, monitoring, logging, auditing, metering, continuous integration (CI), etc. – and user and authorization
12%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
on the right side under the Images heading. Logstalgia can also continually monitor an access log, which turns the software into an attractive monitoring tool. If you run it in a different window, you can see
12%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
management systems. In firewall mode, only authorized queries are passed in to the database; GreenSQL responds to unauthorized queries with an empty result set. The commercial Activity Monitoring and Data
12%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
auditing and penetration testing. The dsniff suite includes tools such as dsniff, filesnarf, mailsnarf, nsgsnarf, urlsnard, and webspy, which passively monitor a network for interesting data. (Arpspoof
12%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
collections distribute RAs to local communication partners without any substantial manual effort. If these activities are not monitored, the rogue router establishes itself as the IPv6 default gateway

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice