Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (53)
  • Article (1)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6

48%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
directory), finding the right location for a given file can be a nightmare. Even if you are dealing with just a few systems, administration of the backups can become a burden. This leads into the question
48%
Create your own turnkey solutions
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fandorina Liza, 123RF.com
Studio means depending on Novell's roadmap for the service – wherever that might take you. This is not to suggest that Novell's product roadmap will lead to Studio's being discontinued or anything like
48%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
-robin approach or a master/slave model for the individual cards. To access the iSCSI server, you alternatively can use the Linux kernel device mapper's multipathing function. As with bonding, many roads lead
48%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
According to figures released by Open-Xchange (OX) [1], they are the leading international technology supplier for hosted groupware, with more than 24 million users. Customers of Internet provider 1
48%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
their IPsec tools in different ways, leading to occasional complications when the two ends of the tunnel are using dissimilar implementations. I decided to try connecting several IPsec alternatives to see which

« Previous 1 2 3 4 5 6

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice