Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 108 Next »

12%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
HTTPD provides the Timeout directive to deal with user-induced denial-of-service problems like this and allows monitoring of the web server's I/O channels, such as the TCP connection to the browser
12%
AWS Elastic Beanstalk
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Aleksandra Glustsenko, 123RF.com
services, monitoring and events show up in their respective tabs; however, unlike Heroku, Elastic Beanstalk (EBS) exposes the underlying technology used to power it, which gives them license to bill
12%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
interfaces. Ganglia is an open source, scalable, distributed monitoring tool. Appliance System Configuration is used to modify retroactively the settings made during the SUSE Linux Enterprise setup phase
12%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
. Figure 2: Profiling can enable various sources (e.g., NetFlow, DHCP, HTTP, or RADIUS protocol) to obtain additional information for an authorization decision. The third persona handles the monitoring
12%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
landscape. Azure provides tools like Azure Security Center and Azure Monitor that can help you track and manage NSG configurations, ensuring that your Linux workloads are always protected against unauthorized
12%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
] library can help. libiotrace This analysis tool monitors programs and collects file I/O profiling data, which sets a perfect entry point to analyze the program on the efficiency of its file I
12%
Using Univention Corporate Server 2.4 for virtual infrastructure management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Martin B, Pixelio.de
that will grow as they fill up. It makes sense for administrators to monitor the level of these directories constantly with the use of a monitoring solution like Nagios, for example. Performance Tuning
12%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
NAS offers are UFS, ZFS, ext2/3, FAT, NTFSm, and RAID-Z. You can monitor the server with SMART or via the logfiles, email, and SNMP. Again, management mainly relies on the web interface (Figure 1
12%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
to monitor, but not become actively involved with, the client-server connection, even if individual rules are configured to let it do so. This setting is useful for testing the module and your own rules
12%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
to set up an HA cluster, which could serve as a fail-safe web or mail server system. Instead of making individual services highly available, cluster managers create and monitor the complete virtual machine

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice