Frontpage
Navigation
Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
All for Admins
Private Affair
AA_VPN-SSTP_123rf-5520644-laptop-with-graphics_Maxim_Kazmin_resized.png
Because Microsoft's legacy VPN protocol, PPTP, has a couple of vulnerabilities, SSTP, which routes data via an SSL connection, was introduced as the new VPN protocol with Vista, Windows Server 2008, and Windows 7.
Container Service
AA_OpenVZ_fo-1392395_ContainerAndSky_sculpies.png
The virtualization technology market is currently concentrating on hypervisor-based systems, but hosting providers often use an alternative technology. Container-based solutions such as OpenVZ/Virtuozzo are the most efficient way to go if the guest and host systems are both Linux.
Simple and Secure
AA_SELinux_fo-6397124_SecurityTheme_Sapsiwai.png
SELinux can provide protection from exploits that could compromise your system – if you know how to set it up and use it. We show you how to solve some commonly encountered problems.
cPanel
AA_cPanel_fo-21859740_ControlRoom_PozitivStudija.png
For companies that provide hosting and email packages to clients to administer a myriad of tasks, WHM and cPanel provide a web-based graphical control panel designed to help.
Appliance Apps
123rf-6128389_EndlessReptiles_Fandorina_Liza_resized.png
Software appliances provide a convenient means for packaging, transporting, and deploying software without the need for complex, repetitive configuration steps.
Virtual Cluster
AA_KVM-Cluster_123rf-684034_ClusterOfTomatoes_Yulia_Saponova_resized.png
High-availability clusters have become an important part of the system administration landscape. Tools like KVM bring the benefits of virtualization to HA clustering environments.
Object of Desire
Fotolia_37115293_Guitar-collection_BrigidaSoriano.png
Scalable storage is a key component in cloud environments. RADOS and Ceph enter the field, promising to support seamlessly scalable storage.
Nailed Down
123rf_13497895_Hammer_Nail_JenniferHuls_resized.png
AppLocker lets administrators of Windows Server 2008 R2 and Windows 7 use policies to block individual applications. This prevents users from smuggling in undesirable programs on USB sticks or by email.
Collect All
123RF_9504068_nodes_cluster_nobeastsofierce_resized.png
Effectively monitoring your cluster can be one of the keys to understanding how the hardware and software are interacting. In many cases, this means examining the performance of a single node.
« Previous
Next »
1
...
441
442
443
444
445
446
447
448
449
450
451
452
453