Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 232 Next »

12%
Life cycle management with Foreman and Puppet
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© auremar, 123RF.com
: package { "apache2" : ensure => "installed", } For Debian, Puppet would select the Apt provider for the package and then run apt-get install apache2. On Red Hat, the Yum package manager would replace
12%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
Services or the Linux ThinLinc remote desktop server also can be supported. A built-in browser is provided, of course, along with a VoIP client that transforms the thin client into a phone. IGEL Linux also
12%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
. Because checksums provide no protection against intentional tampering, Arch Linux and Debian and its derivatives also sign their packages and repositories. They naturally use public key cryptography to do
12%
Moving from Atlassian Confluence to BlueSpice
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Erda Estremera on Unsplash
in the high-tech industry, lawyers, financial service providers, and journalists, are concerned about moving all their collaboration data to the web. Others, even if they aren't in particularly sensitive
12%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
) [1] provides an important basis for this endeavor. Active Directory (AD) is one of the most sensitive structures on the network. This central role makes the DC a preferred target for hackers
12%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
environments, whereas paravirtualization typically involves a variety of host systems. Monitoring OpenVZ and Solaris Zones OpenVZ can provide more containers thanks to a patched Linux kernel. For each
12%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
the firewall, NAT, or proxy configuration to suit requirements for remote access. The Secure Socket Tunneling Protocol (SSTP), which was introduced with Microsoft Windows Server 2008, provides a solution
12%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© victoroancea, 123RF.com
come not as Windows files or Linux packages, but as vSphere Installation Bundles (VIBs); moreover, software components for hardware monitoring and configuration (known as CIM providers) are provided
12%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Helder Almeida, 123RF.com
Online. For smaller companies in particular, Office 365 provides an interesting alternative, because administration is kept very simple and the cloud services are presented to users with a familiar MS
12%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
cards' hardware functions and improved control and configuration of the network connections. But, the current 2.0 version of Hyper-V in Windows Server 2008 R2 also provides optimization options

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice