Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 98 Next »

8%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
needs one computer capable of being compromised, so the chain is only as strong as its weakest link. Therefore, it is always surprising to see how little care companies take when they connect computers
8%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
is to monitor activity in real time with iotop [14] – try running it in a separate terminal while going over the other benchmarks (see Figure 6). Figure 6: iotop
8%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
a mass of data relating to the system and its hardware. Clicking on the respective components takes you to further, more detailed information. The software also displays values in real time (e.g., the bus
8%
The SDFS deduplicating filesystem
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © maridav, 123RF.com
identical data blocks by creating a fingerprint in the form of a hash for each block and then comparing the values. The risk of failure increases of course because each data block exists only once on disk
8%
Integrating PowerShell with Ansible for hybrid automation
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Mulyadi on Unsplash
control over Windows systems with its scripting language. Ansible, conversely, provides a simple yet powerful platform for automating apps and IT infrastructure. It works by connecting nodes, pushing out
8%
Databases in the Google Cloud
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jon Parry on Unsplash
the database. It's a good idea to use random characters, if possible, because after you delete an instance, you cannot reuse the name for seven days. The region is also important. If you want to provide
8%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
the vulnerability. While you're at it, don't forget to set up new backup systems to cushion the effect of a new attack. In the best of all worlds, you will also have an internal contingency plan for each department
8%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
centralized and decentralized. In the Google Cloud, all resources are assigned to projects. In Operations Suite, each project can collect and analyze data on its own. However, if you want to keep track of all
8%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
configuration syntax. Monit Superpowers I played with Monit's great capabilities and was able to monitor almost all the vital resources of my *ix servers. However, its real potential is taking meaningful
8%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
or not this is necessary and which routing entries are actually needed, were points of confusion in the lab. In any case, be sure to enable the traffic in the firewall ruleset. Test Setup Each IPsec gateway was given its

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice