Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (68)
Keywords

« Previous 1 2 3 4 5 6 7

78%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
; whereas KVM [3] supports genuine hardware virtualization in combination with the right CPU. Both virtualization technologies support maximum performance for the guest system in line with the current state
77%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.com [3] for a video that might help you set up your environment
77%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
on the properties of the file format. Pen testers can use a tool called Metagoofil [3] to help find metadata on websites. Metagoofil is an information-gathering tool designed for extracting metadata off public
77%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
to install RADOS and Ceph. Ceph, which is a plain vanilla filesystem driver on Linux systems (e.g., ext3 or ext4), made its way into the Linux kernel in Linux 2.6.34 and is thus available for any distribution
77%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
machines. Moving an external hard disk between two machines might be easiest, but with 20 machines, you should definitely consider a centralized system. Here, too, you must consider the speed at which you
77%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
-of-all-trades is licensed under the GNU GPLv3, you can use it free of charge. The only precondition is a fairly recent Linux distribution with Gnome. Although PAC runs on other desktops, you would have to do without some
76%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
short URLs to longer ones. Most people have used the likes of TinyURL.com [1], Bitly [2], or Google URL shortener [3] to shrink unsightly and unmanageable URLs to something that's more suitable for email
76%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data

« Previous 1 2 3 4 5 6 7

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice