Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 103 104 105 106 107 108 109 110 111 112 113 114 115 116 ... 232 Next »

12%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
In addition to the classic username and password option to authenticate the system, Windows 10 provides other options (Figure 1). In workgroup environments, for example, a picture password can be used. You can
12%
Remote desktop based on HTML5
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Phanlop Boonsongsomnukool, 123RF.com
the need for a VPN client to provide encryption and authentication. This is all very unfortunate, for example, if you are working on a computer in the hotel lobby or an Internet cafe and cannot install your
12%
Welcome
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © archman, 123RF.com
, or is social engineered into providing access to your internal systems. These threats turn your hair as white as the sands of White Sands National Park in New Mexico. Find photos of yours truly for reference
12%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
options are described and illustrated with examples in the GitHub repository. The alerta top command provides a quick overview of critical alarms (Figure 1). Unfortunately, the view cannot be filtered
12%
Hyper-V 3.0 in Windows Server 2012
12.11.2012
Home »  Articles  » 
 
version of VMware products, Hyper-V can perform this replication regardless of the storage system employed; additionally, the function is provided free of charge. Thanks to this new technology, virtual
12%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
similar experiences. Experience and ability are varied and great among the many commodity hardware and solution providers. In a post–single-vendor supercomputer market, the largest issue facing customers
12%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
, was designed to help. This article investigates whether IPv6 can provide a full-fledged alternative to IPv4 on today’s networks. Despite my initial euphoria, reality hit me hard during my testing sessions
12%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
is provided for managing configuration settings, other sources of information are available. These could be lists of server hardware, DHCP and DNS entries, or inventory information from an Active Directory
12%
Linux Foundation Sounds Off on UEFI
28.10.2011
Home »  News  » 
 
.” The document is intended to provide PC hardware manufacturers with guidelines for how to implement the UEFI framework without preventing the owner from installing Linux or another non-Windows OS onto a UEFI
12%
Linux Foundation Sounds Off on UEFI
11.11.2011
Home »  HPC  »  News  » 
 
.” The document is intended to provide PC hardware manufacturers with guidelines for how to implement the UEFI framework without preventing the owner from installing Linux or another non-Windows OS onto a UEFI

« Previous 1 ... 103 104 105 106 107 108 109 110 111 112 113 114 115 116 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice