Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (218)
  • News (4)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 23 Next »

19%
Operating system virtualization with OpenVZ
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© sculpies, Fotolia.com
-online target IP VEID Target IP is the network address of the VE into which you want to migrate to the VE with the ID of VEID. Of course, the vzmigrate tool supports a plethora of different options (e
19%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
a viable network-attached storage system. Sun engineers knew the implementation of a modern framework that served up block devices throughout the network was the next step. The resulting product was Comstar
19%
Our Technological Enlightenment
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© lightwise, 123RF.com
, and computer networks were becoming commonplace in businesses. Still, we were in the dark and were disconnected. The mid-1990s saw a boom in the number of computer users with the new, publicly accessible
19%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
a git push over SSH. Not all Linux statuses can be queried with the Goss onboard tools. For example, the tool detects whether the MariaDB process is running and listening on a specific network port
19%
Monitoring server hardware with the Nagios IPMI plugin
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Vladimir Nenov, 123RF.com
others, IPMI is typically standard equipment [1]. The heart of the IPMI specification is the Baseboard Management Controller (BMC), which uses the network or a local system bus to talk to userspace
19%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
Most admins are well aware of IPsec, the powerful protocol used to encrypt network traffic over TCP/IP networks. IPsec is often used with VPN connections to join remote LANs through a private tunnel
19%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
A penetration tester simulates an attack on a customer's network by trying to find a way inside. Many such attacks begin with the use of a scanning tool, such as Nexpose, Nessus, or Nmap, to look
19%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
In a jungle of shares and network drives, it's easy to lose track – Where exactly are those templates for vacation application forms? Libraries let you collate different storage locations to create
19%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
, admins face limited bandwidth for network-based data transfer. Additionally, they need to worry about data security and protection requirements, the increasing need for automation, huge mountains
19%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
SUSE) already provide inherent load balancing capabilities for most network services, such as web, cache, mail, FTP, media, and VoIP. These inherent capabilities are based on Layer 4 switching, allowing Linux

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 23 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice