Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 113 Next »

10%
Four solutions for Prometheus long-term storage
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sidewaypics, 123RF.com
); although it aimed to solve the same problem, the approach came from a different direction. The strengths of Cortex [3] are the cloud-native-first principle and the resulting virtually seamless integration
10%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
a virtual private network (VPN). RDP files can be digitally signed and protected with certificates, which enhances security while avoiding error messages popping up because of incorrect signing. All
10%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
failover process starts. © MongoDB [7] Replica Set Architecture One special feature of a MongoDB cluster is that it does not require a cluster server or a virtual IP address. In simple terms
10%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
by these models, which allows them to search quickly for similarities in space with many dimensions. The digital world is currently experiencing a boom in chatbots and virtual assistants. These AI-controlled units
10%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
is Microsoft Teams, which many companies were forced to introduce as an emergency measure during the pandemic. However, other services such as virtual private networks (VPNs), Microsoft Dynamics 365, Salesforce
10%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
an initial evaluation of the environment. They provide the installation packages for Ubuntu 20.04/22.4, CentOS 8, and Debian 11, along with Docker, virtual machine (VM) images, and an online demo [2]. If you
10%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
in some of your cases, you might need to use more than one host to perform scans. Of course, the host for Kubescape operation can be virtual. How you install Kubescape essentially depends on your personal
10%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Chances are that any system administrator who governs a meaningful number or servers uses a configuration manager of some sort. Just imagine upgrading the kernel on 20 identical virtual machines
10%
Configure Entra ID with PowerShell Desired State Configuration
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Tom Hermans on Unsplash
, if necessary, a correction of the target system to bring about the desired state, which allows both existing and new systems, virtual machines (VMs), server roles, Active Directory (AD) objects
10%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
Unauthorized access to credentials is a part of virtually any successful cyberattack. Attackers are particularly interested in techniques that provide access credentials that allow far

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice