Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (104)
  • Article (6)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

76%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
. If you reconnect to the remote Unix session with the tunnel command session from above (ssh -L 9999:localhost:3306 ), you can also resume your MySQL session as if the connection had never been
76%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
and the Windows Firewall once-only per subnet. Linux administrators have also had a stateful inspection firewall since kernel 2.6 in the form of ip6tables. IPv6 operations managed on this basis also provide
76%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
for admins. Anyone who has ever had to manage Jenkins or Argo CD will be all too familiar with the issues. That said, the tools are not usually to blame. The classic pipeline for CI/CD setups triggers
76%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
's idea of pressing an entire Linux system onto a CD and making it bootable was a major success. Although the idea of bootable Live systems had already been conceived by resourceful minds before Knopper, he
76%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
in terms of cost and efficiency. This challenge is familiar: Amazon AWS, Microsoft Azure, and Google Cloud Platform (GCP) make it child's play to provision and use virtual infrastructure, but none
76%
MAT: Monitor your infrastructure with Netdata
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
of legacy event monitoring, trending is seeing more frequent use, to the extent that event monitoring is becoming a kind of byproduct. However, those who have ever worked with Prometheus and had to develop
76%
Using Univention Corporate Server 2.4 for virtual infrastructure management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Martin B, Pixelio.de
Desktop. If you want to virtualize servers and desktops with free software only, you can choose one of the two free solutions: KVM or Xen. Although Xen has had everything necessary for deployment
76%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
machine mail order company has had considerable success leasing virtual machines, disk space, and distributed database services to users. Introducing App Engine Google's release of App Engine brought ... Web developers dream of getting their hands on the collective power of Google's servers. Google App Engine offers a free corner of the Google universe. ... Google App Engine ... Expand your sphere with a piece of Google
76%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
for cover. When we asked about this, our questions remained unanswered – maybe because the vendor had lost faith in their own product after reading our questions … . Unique Selling Point Besides asking
76%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
or CPUs were idle, during which the system had an outstanding disk I/O request. %steal : Percentage of time spent in involuntary wait by the virtual CPU or CPUs while the hypervisor was servicing another

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice