Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (56)
  • News (5)
  • Article (4)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

9%
Better Active Directory with Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Sattapapan Tratong, 123RF.com
virtualization of domain controllers. And, making snapshots of domain controllers is no longer a problem either (see the article on Hyper-V 3.0 in this issue). VMware and other virtualization vendors likely
9%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
, the current version of the agent requires 36MB of RAM, 63MB of memory space, and a network bandwidth of 237bps (uplink) and 79bps (downlink), which enables Datadog to collect CPU utilization, I/O rates, TCP
9%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
[12], and Icinga [13], with the advantage that existing alert chains and escalation levels can be rehashed without any problems. Once Falco is connected to the existing monitoring system, alerts
9%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
for exchanging experiences as well. And, if you want to stay on top of developments concerning Kanban while traveling, the "ITK Podcast" [12] is recommended. Infos Scrum: http
9%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
computer room. Table 1 Three Storage Clouds in Comparison Feature ownCloud Dropbox Synology Cloud Station Version 4.0.1 – Beta
9%
Bottom: The new top
07.10.2025
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Lucy Baldwin, 123RF.com
test, hovering around a remarkably low 0.5% (Figure 9). Figure 8: bpytop looking the same as Bashtop, but 75% less hungry for CPU cycles
9%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
will use that in a bit. Listing 1: Check Directory Content $ ls -lstar total 62310 31150 drwxrwxr-x  0 laytonjb laytonjb 31897275 Dec 31  1969 DATA1 31152 -rw-rw-r--  1 laytonjb laytonjb 31897275 Aug  2
9%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
ADRecon Prerequisites .NET Framework 3.0 or newer (included in Windows 7 and later) PowerShell 2.0 or newer (included in Windows 7 and later) AzureAD PowerShell Module 3.0 or newer – installable
9%
The Logic of Helping Users
04.11.2025
Home »  Articles  » 
after breaking it into pieces. Once more, I stopped writing and dropped this article (0 for 2). I took one final swing at having AI tell me what it thought the important issues were in HPC. This time I
9%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
to the root user. If you want to check all files, you can set scan_ignore_root="0" in the conf.maldet configuration file to check the entire database. When maldet needs to scan large areas of the filesystem

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice