Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 133 Next »

16%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
accessible; however, that is only part of the picture. An instance is only useful as the service it exists to provide can be reached by users. Completing service bootstrap is distinct from the point in time
16%
App Proxy support for Remote Desktop Services
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Iwona Castiello d'Antonio on Unsplash
. If you have chosen the same DNS name internally and externally, as in the example, you need to register the name internally in the DNS: The CNAME for websession.contoso.com should point to the name
16%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
pointed to malware, so now I will look at an open source tool called Volatility. Volatility To begin, I go to the workstation that took the image off the Windows machine with the F-Response tool and open
16%
TheSSS: World's Smallest Server Suite
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © zhao lizu, 123RF.com
AV should deal with suspicious files; it then automatically starts a scan of all files. The starting point is the root directory /, and the virus scanner checks all connected hard drives. TheSSS also offers
16%
The Benefit of Hybrid Drives
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Vaclav Volrab, 123RF.com
score points where a persistent cache is beneficial, where the filesystem is bypassed, or where you can gather prioritized data on a drive. Hard disks with an SSD module will always lose out
16%
Nagios Passive Checks
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Lisa Young, 123RF.com
} The command in Listing 8 points to a script in the $USER1$ directory (in the Debian package, this directory is /usr/lib/nagios/plugins/). Listing 8 Command Template for Passive Check 01 define
16%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
in turn point to network people, this approach is of little benefit to the users. Gene Kim describes this vividly in his instructive story The Phoenix Project (see the "DevOps Novel" box
16%
Mobile device management with Microsoft System Center 2012 R2
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © konstantynov, 123RF.com
. SCCM uses "Collections" of users and devices as the basis for distributing software and other SCCM activities. At this point, it makes sense to add all device owners activated in Windows Intune
16%
Security issues when dealing with Docker images
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Kae Horng Mau, 123RF.com
such information. Tools more reminiscent of scanners in terms of functionality specifically look for files that are known to contain a vulnerability. If the scanner finds such a file, it points out the risks
16%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
nodes. One pitfall remains: If the connection fails for some reason (e.g., because of a network failure), the server will work as a standalone system from that point on and thus accept write queries

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice