Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 48 Next »

71%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
of profiling [2], I have focused on individual applications, either serial or parallel [3]. Profiling usually means trying to understand application resource usage patterns by answering questions such as: "How
71%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
-key parameter: duplicity --ssh-askpass --encrypt-key 12345678 /etc scp://dd@example.com//var/backup Normally, you need to type the passphrase after calling the command. If Duplicity runs directly, the GPG agent
71%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
by a select * from htctopbookmarks; (Listing 6). Listing 6 select * from htctopbookmarks 01 1|HTC|http://www.htc.com/|2|11|h|ht|htc 02 2|Google|http://www.google.com/|2|11|g|go|goo 03 3|Facebook|http://www.facebook.com
71%
Into the Cloud for Security
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Tomasz Pacyna, 123RF.com
, Ponemon Institute, pg. 3: https://info.resilientsystems.com/hubfs/IBM_Resilient_Branded_Content/White_Papers/2017_Global_CODB_Report_Final.pdf
71%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
can also protect Exchange Server 2007 SP3/2010 SP2. Basically, the tool creates templates for Group Policies that integrate Microsoft recommendations. Administrators can customize the policies to meet
71%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
, AGPL   Commercial AGPL + commercial GPL + commercial GPLv3 Commercial Available sources http://www.github.com/owncloud http://www.github.com
71%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
's S3. Scalability, (high) availability, and manageability were and still are the essential characteristics that Sheepdog seeks to provide. For Morita, setting up Ceph, which already existed at that time
71%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
://en.wikipedia.org/wiki/Privilege_separation Knoppix boot disks: http://knopper.net/knoppix/index-en.html Amazon S3: https://aws.amazon.com/s3/ GlusterFS: http://www.gluster.org Docker security: https://docs.docker.com
71%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
2 , which are equivalent to normal and increased . More recently, CIS has attempted to provide further assistance in the form of the implementation groups construct (IG1 to IG3). The groups reference
71%
Storage pools and storage spaces in Windows
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Nathalie Diaz, fotolia.com
with a capacity of 3TB, and two hard drives with SATA and SAS connections, each with a capacity of 1TB, to form a storage pool, thus achieving a gross storage capacity of 16TB. This storage can then be used to set

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice