Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (60)
  • Article (3)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

8%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
similarities: Podman and Docker draw on the capabilities of the Linux kernel and seccomp profiles to control process authorizations. Both environments can also configure robust security. That said, you
8%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
/Monit-style configuration is: check process httpd with pidfile /run/httpd/httpd.pid if 2 restart within 3 cycle then exec "/usr/local/bin/alerta --config-file /etc/alerta.conf --profile production send --resource Rocky9
8%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
Servicing and Management (DISM), and create Windows PE images. Additionally, you can use the User State Migration Tool (USMT) in AIK to migrate user profiles and data. Windows AIK also contains the "Volume
8%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
instructions. The filename is specified by the -f (file) parameter: smbtaquery -h Host -i 3491 -f commandfile.txt In profile and interpreter mode, each command must be separated by a comma and parameters
8%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
profiles and user information are stored on the single full-version Satellite Server. The proxy acts as a go-between for client systems and Satellite Server. When a patch is released from Red Hat
8%
A Btrfs field test and workshop
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Adrian Hillman, 123RF.com
for the data. Different profiles can be selected for both metadata and payload data: Single RAID 0 RAID 1 RAID 10 For RAID 0 and RAID 1, you need at least two block devices; for RAID 10
8%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
. As Figure 9 shows, a non-zero think time improves the throughput profile quite dramatically. (12) This trick with the think time reveals the existence
8%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
: Detecting vulnerable assets Creating profiles and evaluating vulnerabilities Prioritizing checkpoints on the basis of risk assessment Monitoring vulnerabilities on an ongoing basis Fixing
8%
OpenStack workshop, part 1: Introduction to OpenStack
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
and manage hardware profiles for the virtual system. It also offers a rudimentary statistics function; whether or not to extend this as a complete billing API is a subject of discussion right now. Ultimately
8%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
. Colors Incidentally, Wireshark has a comprehensive rule set for defining the use of colors in the packet list view. The matching profile editor is located in View | Coloring Rules . By default

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice