Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 133 Next »

17%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
-named Andromeda) was released in August 2019, but some key points of the intended route for the Network Service Mesh have already been defined. Theoretically, it would also be possible to reproduce subnets
17%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
and de-serializing objects as part of data transmission. These efforts have been taken to the point that the mpi4py documentation claims it "… enables the implementation of many algorithms involving
17%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
are available for both the operating system and for server applications such as Exchange and SharePoint. Licensing with Windows Server 2012 R2 Companies can purchase server licenses for Windows Server 2012 R2
17%
Nothing works without a profile
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © abidal, 123RF.com
the requirements for environments with folder redirection [3]. Starting Points Basically, UEM tools have two ways to enable backing up and restoring configuration data. With the "external method," the UEM has
17%
Is System Administration Bound for Extinction?
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © shacil, 123RF.com
or hear, but I can prove my point with a single example: patching. Yes, you can automate patching, and some patching automation is good, but what happens when a bad patch is released that kills computers
17%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
are nothing more than certain points in the network stack of the Linux kernel at which a packet is inspected and, in the case of a match, one or more actions executed. For this purpose, tables that store chains
17%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
groups (both security and Office 365 groups), applications integrated in AAD (both software as a service (SaaS) and in-house programming), and SharePoint Online sites. ELM bundles privileges in access
17%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
with the options you want in each line. To start the respective backup jobs based on a schedule, each line contains a --time option; for example: xsibackup --time="Sun 19:00" --backup-point
17%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
carrying out continuous verification at different points and on different levels: never trust, always verify. The fundamental cornerstones of zero trust are derived from: Continuous verification or
17%
Managing BitLocker with PowerShell
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © sergey Mayorov, 123RF.com
AllSubFeature-IncludeManagementTools Figure 1: On Windows Server (version 2019 is shown here), BitLocker needs to be installed. After that, the cmdlet reports the Success status as True and explicitly points out that a restart

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice