Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1444)
  • Article (117)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 168 Next »

35%
Clustering with the Nutanix Community Edition
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Beau Runsten on Unsplash
Ws Commands and scripts: https://portal.nutanix.com/page/documents/details?targetId=Command-Ref-AOS-v5_20 Information on Life Cycle Manager: https://portal.nutanix.com/page
35%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
and display the status messages in the monitoring tool. Additionally, according to its developers, Inktank [5] is working to improve support for the current monitoring tools; on that front, you can expect
35%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
. Microsoft Defender to Start The core of attack surface mitigation on corporate assets consists of Microsoft Defender for Endpoint or Windows E5 licenses in an environment with Entra ID and Intune. In fact
35%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
Podman in their standard repositories. In immutable Linux distributions like Fedora CoreOS [5] and openSUSE MicroOS [6] (Figure 1), Podman comes pre-installed. Both Linux distributions offer a minimal
35%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
. What Comes Next In agile projects, prioritizing backlog candidates has proven to be challenging. Planning Poker [5] and other methods can help decide which tasks should go to the fore. Experience has
35%
PowerShell for Exchange and SharePoint
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Olexandr Moroz, 123RF.com
for the user@contoso.com mail account, enter the command: get-mailbox user@contoso.com |fl display name, database, alias, organizationalunit Cmdlets are not case sensitive. If you run a wizard in the Exchange
35%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker
35%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
using? 07 1) ANSI Standard CRT 08 2) DEC VT100 09 3) PC Console 10 4) Sun Command Tool 11 5) Sun Workstation 12 6) X Terminal Emulator (xterms) 13 7) Other 14 Type the number of your choice
35%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
distributions for Puppet [4]. Organizations can also choose to purchase a premium module such as sce_linux [5]. Toward Intentional Infrastructure Puppet's strength lies not just in automation
35%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
. Approximately 5,000 photos in JPEG, PNG, and Nikon RAW (NEF codec) formats and a few documents (PDF, LibreOffice Writer, and MS Word) were moved onto the servers in the test. In some cases, the images contained

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 168 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice