Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%3!600 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (403)
  • Article (124)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 57 Next »

18%
Ease your network inventory pain with Spiceworks
07.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Paul Tobeck, fotolia.com
Inventory suite using open source software that includes SQLite, Ruby, and Apache. The spiceworks.exe application is a single, small (66MB) Windows executable file that installs and scans your network devices
18%
U-Move backs up, restores, and migrates Active Directory environments
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Erda Estremera on Unsplash
, and recovery of Microsoft Active Directory. Manufacturer   U-Tools Software LLC [1] Price   One-time purchase including support for one year:       * Small Business around $200       * Domain $489
18%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
in Figure 3, you could select the IP addresses 192.168.100.100 through 192.168.100.200. You need to enter this range below Public IP range/list using a hyphen as the separator character; in the example
18%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
offers 250MB of database storage and 2GB of file storage, whereas the MSPA Process Plan includes 50MB of database storage and 200MB of file storage. These differences could play a role in choosing
18%
Server distributions for small businesses tested
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © wabeno, 123RF.com
. The Koozali Foundation [3], from the US, has been responsible for the software, which was released under the GPL, since 2013. Weighing in at just 640MB for the 64-bit version and just under 600MB for the 32-bit
18%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
for your environments with Layer 3 tools. As long as two hosts have any kind of physical communication path, communication on Layer 3 works, even if the hosts in question reside in different Layer 2 segments ... Large environments such as clouds pose demands on the network, some of which cannot be met with Layer 2 solutions. The Border Gateway Protocol jumps into the breach in Layer 3 and ensures seamlessly ... Scalability in Layer 3 ... Scalable network infrastructure in Layer 3 with BGP
18%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Amawasri Naksakul, 123RF.com
unnecessarily) more than 200MB of compiler tools, such as the omnipotent gcc package. Make It Snappy Unlike the init command example in Figure 6, in this case, I'm running it inside my chroot. For this example
18%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
doesn't handle the routing (that is still the domain of the underlying operating system kernel); however, it does provide a number of routing protocols – Routing Information Protocol (RIP) [3], RIPng [4
18%
Container Apps
02.10.2017
Home »  Articles  » 
 
leave it on a system unnecessarily) more than 200MB of compiler tools, such as the omnipotent gcc  package. Make It Snappy Unlike the init  command example in Figure 6, in this case, I’m running
18%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
policies can be assigned to the same security principal both directly and through policy silos (Figure 3). Policies from the silo always take precedence over the directly assigned policies

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice