Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 160 Next »

38%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
will detect it and issue an alert in the web interface. Hidden Attacks on the Network What kind of attacks does ATA protect you against? According to Microsoft, 76 percent of all attacks on internal networks
38%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
, this process does have a drawback: The session key is part of the communication. Anyone who records the encrypted communication and gets access to the private server key later can decrypt the key and then all
38%
Migrating your network to IPv6
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jarts, PHOTOCASE.com
the tracking of dynamic IPv6 addresses and their assignments? The person responsible for planning does not need to answer all of these questions right from the outset. However, you should be aware
38%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
and limits the achievable performance to the performance of the PCI-SATA converter. NVMe does not need to detour through a storage controller because it communicates directly with PCI, and therefore also
38%
High availability with SQL Server 2012 and 2014
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © li xuejun, 123RF.com
). The failure of one zone does not affect the availability of the infrastructure in another zone. The latency between the different zones within a region is very small. This architecture is thus suitable
38%
Artificial admin
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Maxim Basinski, 123RF.com
unlikely to change overnight. On the other hand, the widespread use of AI in the corporate landscape does not automatically translate to job losses – especially not in an industry that is currently
38%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
, and subscription ID. For memory metrics, ensure you have a mechanism in place (e.g., the Azure Diagnostics extension or custom monitoring solutions) to report memory usage, because Azure Monitor does not provide
38%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
_native_password is considered weak compared to modern authentication methods because it: Uses the SHA-1 hashing algorithm, which is vulnerable to certain types of cryptographic attacks. Does not use salting when hashing
38%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
for small single-node setups on edge devices. However, the overheap of TopoLVM and the resource requirements of the driver are greater than with Hostpath. On the upside, the driver does offer quota management
38%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
for automatic startup, which is required for replication actions. You can use the wizard to start the agent when you set up replication, but this method often does not work reliably. Setting Up Replication

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice