Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (136)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 14 Next »

8%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
of the underlying AD. On the other hand, a poorly configured ADFS farm opens up completely new attack vectors and makes securing the entire environment all the more difficult. The situation becomes particularly
8%
BlackHat USA 2010
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
. In the case of SSL certificates, they scanned the Internet and found 1.2 million SSL-enabled websites [3] [4]. Among the problems found were certificates for reserved addresses (e.g., 192.168.1.2, a reserved IP
8%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
: 192.168.56.101:3306 , w: 1.000 1: 192.168.56.102:3306 , w: 1.000 2: 192.168.56.103:3306 , w: 1.000 Listing 9 Querying the Load Balancer echo getinfo | nc -q 1 127.0.0
8%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
://launchpad.net/~linbit/+archive/ubuntu/linbit-drbd9-stack LVM: https://sourceware.org/lvm2 Attribution-ShareAlike 3.0 Unported: https://creativecommons.org/licenses/by-sa/3.0/deed.en virter: https://github.com/LINBIT/virter Linstor: https://github.com
8%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
(EUM), end-user experience monitoring (EUXM), app monitoring, application performance management (APM), and chain monitoring. In each case, though, the terms only refer to one aspect of E2E monitoring
8%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
automatic pattern-based prevention of malicious activities on the Internet. SpamAssassin [2] and Rspamd [3], to name just two examples, rely on heuristic methods to analyze various factors under the hood
8%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
idea to choose an intuitive name. Listing 2 shows an example. Listing 2 Your Own Domain in OpenShift 01 # rhc-create-domain -n tuxgeek -l tscherf@gmail.com 02 Password: 03 Generating ... Red Hat's new OpenShift PaaS service takes an uncomplicated approach to sending web applications to the cloud.
8%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
, within enterprise Linux distributions, Podman [2] has been the preferred container engine for a while. Both Red Hat Enterprise Linux and SUSE Linux Enterprise have adopted Podman, as have their associated
8%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
with this or a later kernel version (Figure 2). The situation isn't quite as easy with RADOS; however, the documentation [1] points to prebuilt packages, or at least gives you an installation guide, for all
8%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
any time." Here, the second alert is set to be sent only between 6pm (1800 ) and 8am (0800 ) on any day (the first * ; use W for weekdays, or specify particular days with 0 , Sunday, through 6 ... 0

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice