Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (75)
Keywords

1 2 3 4 5 6 7 8 Next »

100%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker ... The sshguard tool does more than just repel attacks; it monitors login attempts and blocks future access. ... 3
84%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
to corrupted data. If you now copy the cluster.conf file to another cluster node and then launch the cluster manager by typing /etc/init.d/cman start, you should see output similar to Listing 4 when you query ... 3
74%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
's with all the colons? Well, put simply, IPv4 addresses are short, so writing out the entire address is easy. With IPv6, however, you get something like 1.2.3.4.5.6.7.8.9.234.25.198.221.82.15.16. To make ... 3
47%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.com [3] for a video that might help you set up your environment ... AppLocker lets administrators of Windows Server 2008 R2 and Windows 7 use policies to block individual applications. This prevents users from smuggling in undesirable programs on USB sticks ... Using AppLocker to block applications on networks
36%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
your attention: In the Bacula system, each task is handled by a separate program. Tasks can include reading the data to be backed up and transferring them across the network, writing to the backup media ... Free backup tool for data centers
35%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
available in the /var/lib/oprofile/samples directory. For a general overview, you can access the data with opreport – either the data for the complete system or the data for a specific application (Listing 3 ... Does your application data take ages to creep off your disk or your network card, even if no noticeable activity is taking place? Tools such as OProfile and SystemTap help you find out why. ... Data on Tap
32%
DBaaS – How they make data scale
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Rungaroon TAWEEAPIRADEEMUNKONG, 123RF.com
, instead of finding out how to install it, I thought I'd learn how these guys solve the problem that matters most in the cloud: keeping something running all the time and at scale. What's That? Cloud means ... DBaaS – How they make data scale
29%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
-Component Glue The new oVirt version 3.1 [3] is available on the oVirt project homepage. The package contains the JBoss application server 7.0 as the foundation for the oVirt engine, the KVM hypervisor, an SDK ... Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt 3.1 ... Managing virtual infrastructures with oVirt 3.1
16%
Microsoft Active Directory Rights Management Services
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © vska, 123RF.com
One of the most dreaded calls to be received by an IT administrator is that a former employee is suspected of stealing intellectual property or financial or personal data. Your task is now ... A built-in Microsoft AD RMS server role can help prevent data loss in your organization.
14%
Installing and managing thedistributed GlusterFS filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Tetiana Pustovoitova, 123RF.com
FS website even has prebuilt packages for CentOS 5.7 and 6.x, Debian 5.0.3, Fedora 11 and 16, and Ubuntu 11.10. Users with any other distribution will need to turn to the source code, but the installation ... Sure, you could pay for cloud services, but with GlusterFS, you can take the idle space in your own data center and create a large data warehouse quickly and easily.

1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice