Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (178)
  • Article (9)
  • News (7)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 20 Next »

16%
Manage your configuration with Rudder
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Karla Car on Unsplash
, Rudder handles two tasks at the same time in a web-based environment that monitors the configurations of your infrastructure components continuously in real time, presents a high-level summary
16%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
on Mac OS X and OpenBSD. To check out my Ubuntu 11.04 laptop's /bin caching status, I enter: $ ./vmtouch /bin Vmtouch crawled the files in /bin and reported that about half of the memory pages
16%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
ubiquitous that even my laptop can act as a VMware or Xen host. I feel vindicated for gushing over a technology that, in 1999, some industry pundits labeled "cute" or "trendy." I felt the same way when my
16%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
swapping well, and a laptop might hibernate (suspending to disk leverages swap area storage). On servers, swap mostly ensures that intermittent conditions will not cause a crash, as performance constraints
16%
Living with Limits in the Post-PC Era
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
of when we imagine a traditional desktop computer. But, when contemporary analysts write and speak about the Post-PC Era, they're talking about desktop computers and standard laptops as well. By my
16%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and even individual DLL files in special use cases, including the ability to distinguish between program and DLL versions. AppLocker can also create automatic policies and monitor specific directories
16%
Modern network diagnostics
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Paul Aniszewski, 123RF.com
testing and latency analysis. On Linux, mtr (my traceroute) has become the gold standard for real-time network monitoring, combining the functionality of ping and traceroute to provide continuous, dynamic
16%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity
16%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
, a laptop and an extra cable tester will be more helpful. This mix of equipment, however, is more unwieldy, heavier, more complex, and less robust than a specialized network tester. In contrast, Lan
16%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
when something goes wrong, the software you can use with a smartphone to fix it, and other options you have to control your machines from a distance. Monitoring and Alerts Several software options

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice