Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 208 Next »

12%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
implemented in a demilitarized zone (DMZ), which is a subnet that provides controlled access to public servers and services that exist in it. A firewall separates the Internet from the DMZ, and another firewall
12%
The Great Resignation
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © ismagalov and Daniil Peshkov, 123RF.com
there, and you never know, you just might end up taking on a new challenge that meets all of your expectations. The Great Resignation indeed provides opportunities for those who want to go for them
12%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
In addition to the classic username and password option to authenticate the system, Windows 10 provides other options (Figure 1). In workgroup environments, for example, a picture password can be used. You can
12%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
options are described and illustrated with examples in the GitHub repository. The alerta top command provides a quick overview of critical alarms (Figure 1). Unfortunately, the view cannot be filtered
12%
Remote desktop based on HTML5
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Phanlop Boonsongsomnukool, 123RF.com
the need for a VPN client to provide encryption and authentication. This is all very unfortunate, for example, if you are working on a computer in the hotel lobby or an Internet cafe and cannot install your
12%
Hyper-V 3.0 in Windows Server 2012
12.11.2012
Home »  Articles  » 
 
version of VMware products, Hyper-V can perform this replication regardless of the storage system employed; additionally, the function is provided free of charge. Thanks to this new technology, virtual
12%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
similar experiences. Experience and ability are varied and great among the many commodity hardware and solution providers. In a post–single-vendor supercomputer market, the largest issue facing customers
12%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
, was designed to help. This article investigates whether IPv6 can provide a full-fledged alternative to IPv4 on today’s networks. Despite my initial euphoria, reality hit me hard during my testing sessions
12%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
is provided for managing configuration settings, other sources of information are available. These could be lists of server hardware, DHCP and DNS entries, or inventory information from an Active Directory
12%
Linux Foundation Sounds Off on UEFI
28.10.2011
Home »  News  » 
 
.” The document is intended to provide PC hardware manufacturers with guidelines for how to implement the UEFI framework without preventing the owner from installing Linux or another non-Windows OS onto a UEFI

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice