Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (232)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 174 Next »

13%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
/write-many access. For the filesystem-based storage classes – Network File System (NFS), Server Message Block (SMB), or CephFS – on the other hand, it is exactly the other way around. RWM mode works, but without
13%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Cyberattacks come in many forms, such as secret spying on company networks, sabotage, and disruptive actions. In a disruptive action, denial of service (DoS), the attacker attempts to overload
13%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
by the name vax. It is best to copy the binary into a directory that is in the path, for example, /usr/bin or $HOME/bin. To give the emulator networking capabilities, you need to install the developer package
13%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
life cycle phases of a monster VM, which are difficult to create, manage, and move. The challenges include: clean configuration of the physical server (BIOS, CPU, memory, network cards), correct
13%
Better Active Directory with Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Sattapapan Tratong, 123RF.com
Active Directory is the heart of most Windows networks, and now a new version of Windows Server 2012 brings several improvements over the previous version. One important advantage is the easy
13%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
– such as enabling the network or launching the httpd. Each of these tasks is a job from Upstart's point of view, but it will only take on a job if a matching event has occurred previously. An event of this kind could
13%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
of managed devices on your network. The next task isn't as easy. For it, you must tally the different mobile device types you deal with. Think of the possible options facing you: Windows Mobile's various
13%
A free anti-spam tool for Exchange environments
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© baurka, 123RF.com
with a large volume of email. The best option is to use a Linux server – for example, Ubuntu or Debian. That said, however, administrators on Windows networks do have the option of running ASSP on Windows
13%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
whose addresses are then scanned to find open ports and thus identify services running on them. SNMP queries also provide detailed information about components and status, especially for networks
13%
Amazon to Offer DDoS Protection of AWS Users
07.12.2016
Home »  News  » 
 
for volumetric attacks, intelligent attack detection, and mitigation for attacks at the application and network layers. Customers also get 24/7 access to Amazon’s DDoS Response Team (DRT) for custom mitigation

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice