Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 148 Next »

13%
Alternative virtualization solutions when OpenStack is too much
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © elnur, 123RF.com
and never wanted to compete with VMware. Moreover, classic VMware setups are often based on completely different premises; for example, software-defined networking (SDN) is missing as a core component. Many
13%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
of specifying individual ports that will be included in the test. Staying with the network, in terms of site topology, correct mapping of subnets, the site, and the domain controller is immensely important
13%
Working with Microsoft Azure RemoteApp
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © bloomua, 123RF.com
integrate the Terminal Server in the cloud into your local Active Directory domain and thus also supply your own group policies. You can also use file and application servers directly in your local network
13%
The SDFS deduplicating filesystem
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © maridav, 123RF.com
computer nodes on a network, or in the cloud. A built-in load balancer ensures even distribution of the load across nodes. This means that SDFS can handle large volumes of data quickly – given a suitably
13%
Building a virtual NVMe drive
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © lassedesignen, 123RF
of traditional HDDs, so, what to do? Create a hybrid NVMe SSD and export it across an NVMe over Fabrics (NVMeoF) network to one or more hosts that use the drive as if it were a locally attached NVMe device (Figure
13%
Proxmox virtualization manager
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image by Daniela Cuevas on Unsplash.com
approaches on the network side: Basically, the network concept of the solution is based on network bridges, but you can also integrate software-defined networking (SDN) solutions such as Open vSwitch. IPv4
13%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
in this example. VirtualBox networking can be quite challenging, so getting this setup to work will give you the confidence that a cloud or data center deployment will work without major issues. You might wonder
13%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
-made components from the network for the roles, be sure to back up the Ansible Playbooks and the configuration files of the individual services, because these are specific to the respective installation. It goes
13%
Red Hat Enterprise Linux 8 pre-series test
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image Photo by Filip Mroz on Unsplash
calls to scripts and programs entail. Network News If you are running a RHEL-based firewall, you have to be prepared for several changes, the biggest of which relates to the packet filter. Officially
13%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
analysis to network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, automotive and exploitation." In this article, I look at BackBox Linux and what is necessary

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice