Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 0mb 2010 Llorente"523 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (8)
Keywords
100%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
System (output follows) 09 DOWNLOAD PKGS FILES XFER (MB) 10 Completed 20/20 3021/3021 42.55/42.55 11 12 PHASE ... 0
72%
Automating Migration to openEuler
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Chris Briggs on Unsplash
Rubén Llorente ... of a majority of Red Hat employees. In 2020, Red Hat unilaterally discontinued CentOS development, setting end-of-life (EOL) dates for the active versions much earlier than the community expected. According
31%
News for Admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
 
compatibility between releases. Learn more at OpenELA: https://openela.org/. Ultra Ethernet Consortium Releases 1.0 Specification The Ultra Ethernet Consortium (UEC) has released UEC Specification 1.0 (https ... Releases 1.0 Specification; CVE Foundation Issues Call for Support; Doudna Supercomputer in Development at NERSC; AlmaLinux OS 10 Released; CloudBees Introduces Unify DevOps Solution; Red Hat Enterprise
30%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
an executable Grml installation to a standard USB storage device in next to no time. If you want to do yourself a favor, grab a USB storage device with USB 3.0, which has long been standard. As icing on the cake
28%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
). If a check fails, you will need to carry out an in-depth investigation to determine the cause. Goss has been testing Linux systems for almost 10 years, with support for Windows being added in 2020, although
28%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
a step in the right direction. Authentication policies can, to a certain extent, help limit the attack surface for brute force. For example, a Tier 0 account cannot be blocked by a brute-force attack
28%
Securing AI model deployments with SELinux
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Kirsty Pargeter, 123RF.com
app was containerized with vulnerable settings: a --privileged flag and volume mount -v /etc:/host-etc. In test 1, SELinux set up in permissive mode, sudo setenforce 0 sudo podman run --privileged -v
26%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
admin groups necessary, if you have not already done so. No normal user needs to be able to list administrators, highly privileged groups, and Tier 0 systems. Also, consider the permissions of the Admin

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice