Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (87)
  • News (11)
  • Article (8)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

53%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
, the current version of the agent requires 36MB of RAM, 63MB of memory space, and a network bandwidth of 237bps (uplink) and 79bps (downlink), which enables Datadog to collect CPU utilization, I/O rates, TCP
53%
Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure
05.12.2024
Home »  News  » 
 
, such as Cisco Discovery Protocol (CDP) or Link Layer Discovery Protocol (LLDP). Disable Internet Protocol (IP) source routing. Disable Secure Shell (SSH) version 1. Ensure only SSH version 2.0 is used
53%
Operating system images with bootc
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © alfazetchronicles, 123RF.com
that the components are included in the image: # podman run --rm -it quay.io/centos-bootc/centos-bootc:stream9 rpm -q kernel systemd podman bootc kernel-5.14.0-467.el9.aarch64 systemd-252-37.el9.aarch64 podman-5.1.0
53%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
. Listing 1 DRBD Resource for VM # vi /etc/drbd.d/proxy.res resource proxy { device drbd0; disk /dev/drbd/proxy; meta-disk internal; on alice { address 10.42.0.100:7789; node-id 0
53%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
53%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
53%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
installing the software locally and enter a proxy address of 127.0.0.1:8080 . You could also use a proxy auto-configuration (PAC) file to simplify the global network configuration; the required files
53%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
on YouTube (https://www.youtube.com/watch?v=GfH4QL4VqJ0), features accounts from Guido van Rossum, Travis Oliphant, Barry Warsaw, and many others. It tells "the story of Python's rise, its community
53%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
computer room. Table 1 Three Storage Clouds in Comparison Feature ownCloud Dropbox Synology Cloud Station Version 4.0.1 – Beta
53%
Bottom: The new top
07.10.2025
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Lucy Baldwin, 123RF.com
test, hovering around a remarkably low 0.5% (Figure 9). Figure 8: bpytop looking the same as Bashtop, but 75% less hungry for CPU cycles

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice