Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (90)
Keywords

« Previous 1 2 3 4 5 6 7 8 9

12%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Password = "YdhKKoy2Huq1CVHwIR" 05 Pid Directory = "/var/run" 06 Query File = "/usr/lib/bacula/query.sql" 07 Working Directory = "/var/lib/bacula" 08 } 09 10 Fileset { 11 Name = "Full Set" 12
12%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.gz cd pen-0.18.0/ ./configure make make install Started with: ./pen -r -p pen.pid -C localhost:4444 -S 3 \ localhost:3306 192.168.56.101:3306:100 \ 192.168.56.102:3306:100 192
12%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
AMD64 and ARM64 HTTP Boot support in Debian Installer and Live images for UEFI/U-Boot systems Upgraded software stack: Gnome 48, KDE Plasma 6, Linux kernel 6.12 LTS, GCC 14.2, Python 3
12%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
programs. This is not always the security solution's fault. An application that is not programmed carefully and fails to comply with RFCs can trip a SIEM signature. In this test, Prelude suspected a DoS
12%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
it to process after loading, which makes it clear that Falco is not an entirely new solution, because the kernel driver is, strictly speaking, legacy software and dates back to the days when eBPF [3
12%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
applications. Java-related and performance-critical projects use JRuby [3], a Ruby implementation in Java that leverages Java bindings in a Rails project. RubyGems [4] is a de facto standard for extensions
12%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
Shell 2.0, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
12%
Request Tracker – the underestimated open source ticket system
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
Richard CAtA, 123RF.com
The Information Technology Infrastructure Library (ITIL) [1] which was developed back in the 1980s, has established itself in recent years as the standard for IT Service Management (ITSM). One
12%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
used a virtual machine on a VMware ESX server. The physical underpinnings were a ProServ II server by ExuS Data with two Xeon quad-core processors and 16GB of RAM (Figure 1, top
12%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
to this component as Horrorsync. Corosync was later split up again. Whereas Corosync now primarily handles the exchange of data between the different systems in a cluster, Kronosnet [3] ensures that the information

« Previous 1 2 3 4 5 6 7 8 9

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice