Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (72)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

22%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
. Infos OProfile project homepage: http://oprofile.sourceforge.net/news Kernel debuginfo information: http://fedoraproject.org/wiki/StackTraces#What_are_debuginfo_rpms.2C_and_how_do_I_get_them.3F
22%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
-based approach alone is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods
22%
Monitoring with Zabbix
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Les Cunliffe, 123RF.com
(Figure 3) expects an intuitive name. When you choose it, remember that the name will also be the subject line for the email sent when the trigger is tripped, as in, "Ping failed – host unreachable
22%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
in line 2. Place Listing 3 in a file called build.xml and place it in the helloworld directory. The important thing is to keep the directory structure; the App Engine does not support WAR archives right now
22%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
. The developers at Coroot [1] go beyond the usual intrusion detection systems (IDS) on the market today and offer a kind of artificial intelligence (AI) IDS as a service, revealing several interesting technical
22%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
of remotely initiating immediate actions on the client and, where needed, being able to help resolve a problem by sharing the desktop. It is a kind of TeamViewer on steroids, if you like, with a monitoring
22%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv3
21%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
. Often, when you have highly normalized data [2] in your database, "views" are used for convenience when querying the database. A view is kind of like a saved query. You can think of it as a particular
21%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
Panel's product line is Enkompass, essentially cPanel for users of Microsoft Windows Server products. Enkompass can manage multiple servers across an Active Directory domain. In this article, I will be focusing ... For companies that provide hosting and email packages to clients to administer a myriad of tasks, WHM and cPanel provide a web-based graphical control panel designed to help. ... cPanel ... cPanel
21%
Installing and managing thedistributed GlusterFS filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Tetiana Pustovoitova, 123RF.com
add more servers or remove existing servers from the storage pool on the fly. GlusterFS works kind of like "RAID on the network," and if you look closely, you will discover many RAID concepts during

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice