Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 34 Next »

32%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
, of course). Hiawatha adds an extra layer of security, delivering ready-to-use rewrite rules for different CMS options. In comparison with Apache and Nginx, the Hiawatha configuration file is much more
32%
Windows Server 2016 for small servers
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © blas, Fotolia.com
area of the launchpad, where errors that occur on the client computer are displayed to users. If they work with one of the smaller editions of Windows 8.1 or Windows 10, users can still work with shares
32%
Stretching devices with limited resources
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Lucy Baldwin, 123RF.com
Small embedded devices running Linux often face a trade-off between limited resources in CPU and RAM and the abysmal write performance of SD card storage with abundant capacity. The first rule, as I
32%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
NetShell to indicate the validity and status of IPv6 addresses. Of course, you can again tweak various interface and address parameters. If you want to permanently add the IPv6 address 2001:db8
32%
Secure microservices with centralized zero trust
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Christopher Ruel on Unsplash
and updating identities for all the workloads that make up your application and of trying to maintain complex sets of firewall rules to control who can talk to which host on what port. When zero trust is working
32%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
Attaching an iSCSI Device $ uname -a Linux DANSBOX 6.8.0-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 15:51:52 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux $ lsblk NAME MAJ:MIN RM SIZE RO TYPE
32%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
environment, the required infrastructure is set up quickly. After installing the Windows Management Framework 4 [1], included in Server 2012 R2 and Windows 8.1, you already have the tools in place. Power
32%
Server update with Azure Update Management
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Pablo Heimplatz on Unsplash
systems include CentOS 6/7, RHEL 7/7, SUSE starting at version 12, and Ubuntu starting at version 14.04. However, you cannot update Windows 7, 8.1, or 10 with the solution. Microsoft recommends Endpoint
32%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
of the week, time of day, and role of the company using it, making it difficult to establish static detection rules. Limits are set either too narrow or too wide and thus can let an attack through. A better
32%
Storage innovations in Windows Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liubomirt, 123RF.com
, say, to restrict a VM. In addition to listing the performance of your VMs, you can configure different rules that govern the use of resources. These rules regulate either individual VMs or groups

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice