Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 148 Next »

13%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Jack Hunter on Unsplash
will find the root filesystems of all your installed distributions in subfolders of the \\wsl$ virtual network share. If you need graphical tools that do not exist as native applications for Windows
13%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
features. In return, however, Seesaw has strict requirements: at least two network ports per machine on the same Layer 2 network. One is used for the system's own IP, and the others announce the VIPs
13%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
to the viewer also contains hyperlinks (i.e., cross-references to further text passages and other documents in the network). Hypertext Markup Language (HTML) has become established on the Internet. Starting
13%
The advantages of configuration management tools
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Galina Peshkova, 123RF.com
to explain each of several versions of the data in the current and valid data set within the network. It is important that all the components that are active in a cluster agree on the state of the cluster
13%
Setting up Google Apps for Work
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Galina Peshkova, 123RF.com
. It is also possible to log on to the connected network thanks to the support of OpenID. Google Apps can access data on the local network using the secure data connector, and integration in an existing network
13%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
to interfere with the network traffic between Exchange and Office 365. This is especially true for businesses that use Microsoft Forefront Threat Management Gateway (TMG). You should generally enter the IP
13%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
rank and communicates over whatever network exists between the nodes. To adapt to larger and larger systems, data communication has adapted to use multiple levels of communication. MPI ranks within
13%
OpenStack Kilo release
04.08.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
runs in the background. Kilo introduces two major innovations for Keystone. On one hand, Keystone instances of multiple OpenStack clouds can be connected to create a federation network. Users can log
13%
OPNids: Suricata with built-in machine learning
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © sarah maher, 123RF.com
to check incoming traffic for known signatures, it must first see the traffic. The same is true for outbound traffic: A common misconception is that attacks are identified primarily by suspicious network
13%
Samba pitfalls in daily operation
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © lightwise, 123RF.com
Samba has been the link in heterogeneous networks with Windows and Unix for many years. Once you have mastered the installation, though, everyday operation can present some potential pitfalls

« Previous 1 ... 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice