Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (246)
  • Article (10)
  • News (7)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 27 Next »

19%
Welcome
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
and opinions. We also have more systems, virtual and physical, than we can effectively manage psychically. You need software tools that measure system, network, and application performance in an objective way
19%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
that are opened, as well as UDP traffic. Note that Process Monitor does not save the content of the TCP packets or payload data; it is not specifically designed for network monitoring. If that is what you need, you
19%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
Tcpdump is a widely used and powerful tool that captures, parses, and analyzes network traffic. Created by the Network Research Group at Lawrence Berkeley National Laboratory in Berkeley, California
19%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
, a number of servers and platforms wrestle for the favor of small companies that must provide things like print and data services in heterogeneous networks. Small business servers are tailored to the needs
19%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
the network. To replicate a virtual server on another Hyper-V host with Windows Server 2012 or Hyper-V Server 2012, after configuring the host, right-click on the appropriate virtual server and select
19%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
a software tool called DNSViz to help network administrators with Domain Name System (DNS) vulnerabilities. DNSSEC is a government-mandated security feature for all federal information systems. According
19%
Give your servers the once over with Nmap
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© ragsac, 123RF.com
, some operating systems insist on opening up ports by default on installation. Along with a handful of other tools the Network Mapper (Nmap) [1] utility is commonly used by both system administrators
19%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
of successors and forks: Each of the large public IRC networks has its own fork, and various forks exist in the form of private projects. The rising star among IRC servers in recent years has been Ratbox IRCd
19%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
selecting a tablet, check out available system administrator-oriented client applications, such as VPN, SSH, RDP, VNC, VMware View, Citrix Receiver, DaaS, Database tools, and network testing tools
19%
Manage your configuration with Rudder
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Karla Car on Unsplash
management but also helps you focus on compliance in the dashboard (Figure 1); for example, Rudder lets you know whether security-relevant patches have been rolled out across the entire network

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice