Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 213 Next »

18%
Web-based network monitoring
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © arasdubov, 123RF.com
. Bloonix is a modular monitoring tool that combines numerous services in a single interface, offering a quick overview of network components. The Idea Bloonix [1], written in JavaScript and Python 3
18%
OpenNebula – Open source data center virtualization
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Sternenhimmel, fotolia.com
current providers, however, the design guide [3] provides detailed descriptions and instructions that help avoid classic misconfigurations. The basis is an installation composed of four components
18%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
, as in Python [3] or Node [4]. Recent books have been published about writing shell commands in Rust [5], Python [6], Node.js [7], and even Go [8], and it is into this last language's interesting performance
18%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
data. End-to-end encryption is made possible by the use of protocols such as HTTPS, POP3S, or IMAP4S. Managed switches also offer the option of preventing such attacks, although the security function
18%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
database management systems including PostgreSQL [3] and Memcached [4]. Maatkit was developed in 2006 by Baron Schwartz. Since 2008 Daniel Nichter has been the main developer, although Schwartz still
18%
Migrate your Git repositories to Gitea
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Ray Hennessy on Unsplash
.*)' | grep -v ' -> ' | cut -f3 -d'/') do git checkout "${mybranch}" git pull done The git branch -a command in the first line returns the names of all branches in the repository. For the purpose
18%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
I think virtually everyone in HPC knows the Warewulf open source cluster provisioning and management tool. I wrote about Warewulf starting with Warewulf 3, followed by a series on Warewulf 4. Since
18%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
of credentials, improving the user experience while minimizing security risks; (2) multifactor authentication (MFA), which prevents unauthorized access to sensitive resources; (3) identity management, which
18%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
. For other distros, the Ratbox source files are available at the project website [3]. After unzipping, you can install with the classic three-command trick of configure, make, and make install. That Ratbox
18%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
is supplied free of charge to customers, is currently available as version 3.06 for Windows and Linux. Figure 1: The Igel thin client UD3 series (source: Igel

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 213 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice