Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1176)
  • Article (302)
  • News (174)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 166 Next »

28%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
signatures. And the successors of SSL, TLS 1.0 and 1.1, do not improve on this; it is not until TLS 1.2 that TLS began to support newer algorithms with SHA-2. On the server side, you need version 1.0 ... NIST has chosen the Keccak algorithm as the new cryptographic hash standard but, in real life, many users are still waiting to move to its predecessor SHA-2.
28%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
Windows To Go (W2G) is one of those topics that leaves everyone a little puzzled at first mention. The first question that comes to mind is, "Why would I want or need such a thing as W2G
28%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
for installation of certain Windows features. Listing a computer's group memberships. Entering DNS servers. I am using Windows 10 client with a Windows Server 2012 R2 domain, with PowerShell v5
28%
Microsegmentation with VMware NSX and vRealize Automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © hketch, photocase.com
in the graphical user interface. When you get there, edit the corresponding vSphere endpoint (Figure 2). Now check the Specify Manager for Network and Security Platform box, enter the URL of the NSX Manager below
28%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
the command line, but the developers have also provided a graphical front end [2], although it is still in an experimental phase, so you might want to avoid using it in production environments. The application
28%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
represents different aspects and functions within an industrial network. Levels 0, 1, and 2 relate to direct production control. Level 0 includes sensors and actuators that interact directly with the physical
28%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
): { echo -ne "HTTP/1.0 200 OK\r\n\r\n"; \ cat filename.tar.gz; } | nc -l -p 15000 Be warned that this might not work for you, but with some trial and error, to enable some extra interaction, you could try
28%
Monitoring Tools for Admins
04.11.2025
Home »  Articles  » 
after breaking it into pieces. Once more, I stopped writing and dropped this article (0 for 2). I took one final swing at having AI tell me what it thought the important issues were in HPC. This time I
28%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
Pulp, you will find prebuilt RPM packages for Fedora, Red Hat Enterprise Linux, and CentOS [2]. You can access the source code via the Git repository [3]. After downloading the Yum repository
28%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
additional computations to perform in this case, I expected performance to be poorer. Again, the configuration from the previous test was used: two CPUs, 2,200 checks, run every 60 seconds, delays between 0

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice