Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • News (5)
  • Article (2)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10

26%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
corruption can get worse, which might lead to losing a complete disk read/write head. Copy the complete disk, not just the parts you assume are relevant (unless you don't have enough time for a complete
26%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
some leading spaces, sed replaces that hash mark and a following t (either uppercase or lowercase), if present, with #p and adds an additional keyword following it: sed -i '/^ *#/s/#[ tT] */#p iop1
26%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
directory), finding the right location for a given file can be a nightmare. Even if you are dealing with just a few systems, administration of the backups can become a burden. This leads into the question
26%
Create your own turnkey solutions
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fandorina Liza, 123RF.com
Studio means depending on Novell's roadmap for the service – wherever that might take you. This is not to suggest that Novell's product roadmap will lead to Studio's being discontinued or anything like
26%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
-robin approach or a master/slave model for the individual cards. To access the iSCSI server, you alternatively can use the Linux kernel device mapper's multipathing function. As with bonding, many roads lead
26%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
leads to comparable results. All of the components I looked at here are available free of charge online and work perfectly on Ubuntu 24.04. They are also published under a free license. A solution
26%
A Btrfs field test and workshop
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Adrian Hillman, 123RF.com
assigned to a data type, they were (until now) not automatically released until no longer needed. When you create new data, this process can lead to a filesystem that has insufficient reserve capacity
26%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
According to figures released by Open-Xchange (OX) [1], they are the leading international technology supplier for hosted groupware, with more than 24 million users. Customers of Internet provider 1
26%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
their IPsec tools in different ways, leading to occasional complications when the two ends of the tunnel are using dissimilar implementations. I decided to try connecting several IPsec alternatives to see which

« Previous 1 ... 3 4 5 6 7 8 9 10

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice