Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (106)
  • News (9)
  • Article (8)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

40%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
AMD64 and ARM64 HTTP Boot support in Debian Installer and Live images for UEFI/U-Boot systems Upgraded software stack: Gnome 48, KDE Plasma 6, Linux kernel 6.12 LTS, GCC 14.2, Python 3
40%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
and values. Another solution, and one that has always been something like etcd's natural archenemy, demonstrates this problem vividly. Consul [3] (Figure 2), from HashiCorp, a corporation that recently became
40%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
of a new setup phase in the data center. Foreman can be installed retrospectively, but this is even more time consuming. Tinkerbell: Success with Kubernetes Tinkerbell [3] has made a name for itself
40%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
. If you don't want to check the various providers manually, you can use the somewhat outdated ClamAV Unofficial Signature Updater [2] package or the Fangfrisch [3] tool, which specialize in this task
40%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
.g., A becomes 4, E becomes 3, O becomes 0, 1 becomes !, etc.), makes the password even more complicated and does not make it any easier to handle. For example, the Robbie Williams refrain Hell is gone and heaven
40%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
will be controversial, revolve around networking (Table 3). The idea is to start understanding the basics of networking and a few commands on how to check on various aspects. Table 3: Secondary Networking HPC Linux
40%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
passes an IPv4 address to the API website and expects the correct geographical assignment: http: geoip-api: status: 200 url: http://geoip.example.net/1.2.3.4 body: - Australia
40%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
, such as an external hard drive, or directly across the network. You can also set up a schedule (Figure 3). Figure 3: Scheduling the replication
40%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
(Figure 3). In subsequent test runs, you can compare the results with a previously saved map; devices added or removed are listed in each category. Figure 3
40%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
to this component as Horrorsync. Corosync was later split up again. Whereas Corosync now primarily handles the exchange of data between the different systems in a cluster, Kronosnet [3] ensures that the information

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice