Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%2222%21490 Llorente%2012 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (78)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8

44%
FreePBX phone system
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Lofik, Fotolia.com
://issues-archive.asterisk.org/ASTERISK-30451 Code for this article: https://linuxnewmedia.thegood.cloud/s/9nFQcFb2p8oRMEJ The Author Martin Loschwitz is the founder
44%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
= bob 24 [osd.2] 25 host = charlie 26 [mds.a] 27 host = alice Most importantly, the nodes in the RADOS cluster must reach one another directly using the hostnames from your ceph.conf file
44%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
access to get permission to read the password file, rather than being easily found by surfing through web-accessible directory structures (Figure 2). Figure
44%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
machines. Moving an external hard disk between two machines might be easiest, but with 20 machines, you should definitely consider a centralized system. Here, too, you must consider the speed at which you
44%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
automatic pattern-based prevention of malicious activities on the Internet. SpamAssassin [2] and Rspamd [3], to name just two examples, rely on heuristic methods to analyze various factors under the hood
43%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
for NetBox or other common IPAM tools. In general, you can see that Foreman fully embraces its role in an IT setup as a "single source of infrastructure truth" [2] and does not tolerate additional tools
43%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
't doing too much at the moment either, although version 9.1 from January 2021 is still available [1] and was featured in the June 2021 Linux Magazine [2]. Developer Klaus Knopper is now very busy
43%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
length (typically 20 characters). In a hypothetical environment where a password is typed in a dialog from a keyboard, this recommendation might even be justified. Unfortunately, password hashes are often
43%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
://github.com/hpcraink/fsprj2, https://www.admin-magazine.com/Archive/2022/71/A-ptrace-based-tracing-mechanism-for-syscalls POSIX: https://pubs.opengroup.org/onlinepubs/9699919799 MPI: https://www.mpi-forum.org Script

« Previous 1 2 3 4 5 6 7 8

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice