Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 148 Next »

13%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
One of the latest trends among cyber criminals is to encrypt files on a network, forcing the user to pay a ransom for the decryption of their data. Of course, criminals use cryptocurrencies
13%
When you should and should not use NoSQL databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Artem Gavrysh on Unsplash
an answer, even if it might not always use the most up-to-date data. For example, if the number of contacts on a social network is temporarily not up to date, it might be more acceptable than the system
13%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
modules. net Status of the networking subsystem – better interpreted through netstat(8). net/arp The kernel's ARP mapping table. net/dev Network device status
13%
Stretching devices with limited resources
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Lucy Baldwin, 123RF.com
eMMC (not populated) Network 1x Topaz networking switch   2x GbE LAN   1x Ethernet WAN   1x MiniPCIe slot USB 1x USB 3
13%
Managing BitLocker with PowerShell
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © sergey Mayorov, 123RF.com
Locker as a feature in Server Manager or the new Windows Admin Center. Additionally, the option to unlock operating system volumes of client systems on domain networks automatically by means of network unlocking
13%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
of a Microsoft product. For example, Windows performance, process, registry, and network information is easily understood using Windows Management Instrumentation (WMI). Data from Windows server roles and from
13%
Secure microservices with centralized zero trust
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Christopher Ruel on Unsplash
microservices-based architecture? With an expired TLS certificate, your database could no longer prove its identity or play a part in a zero trust network (Figure 1
13%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
on the Internet The biggest success of the Internet lies in the autonomous structure of the connected systems. The term autonomous system (AS) relates to the independence of the local network operators – both
13%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
was developed by François Chollet in 2014 out of necessity for an open source implementation of recurrent neural networks (RNNs) and the long short-term memory (LSTM) models that train them. Keras is Python based
13%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
for the 192.168.2.0/24 subnet. The DNS servers on this network have the IP addresses 192.168.2.1 and 192.168.2.2, and you want the clients to look for host records in the mydomain.example.com and example

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice