Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1130)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 117 118 119 120 121 122 123 124 125 126 127 128 129 130 ... 158 Next »

12%
Exploring Apache CloudStack
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Utemov, fotolia.com
OS. Support for Hyper-V is currently in development and should be available in a future release. CloudStack can manage tens of thousands of host servers installed in multiple geographically distributed data
12%
Hands-on Exchange rights management
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Isaac Marzioli, 123RF.com
a more convenient management option, the RBAC Manager [1] is your choice. It requires no installation and comprises a single EXE file and an XML control file. If the Exchange Management Tools are installed
12%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
these options suggest that Microsoft will continue to rely on RDP in the future and even expand its support. Enabling Remote Desktop Without installing Remote Desktop Services, you can use two active RDP
12%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
want to take on. After a quick look at the tool's website, you initially get the impression that it can also be used in on-premises installations and with bare metal. However, appearances are deceptive
12%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
on the infrastructure or hosting offer, a firewall with a geo-function can be installed upstream of the server, which enables convenient configuration of the security policy in a web GUI. In Figure 2, the OPNsense open
12%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
to the internal network. Remote Desktop (RDP) and other protocols that allow remote access are worthy of note, as well as manipulated software that users download and install. Last but not least, one visit
12%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
. Figure 1: The first and most important barrier occurs between Internet and intranet in a DMZ. If you use VoIP, the Enterprise Session Border Controllers (E-SBCs) are also installed in the DMZ
12%
Overview of cloud platforms and appliances
15.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
to run clouds just for the sake of doing so; instead, they want to launch applications in them. They view maintenance (installing patches, etc.) on a virtual operating system platform as an unnecessary
12%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, including every type of hardware and the firmware installed and running on it, you also have potential points of attack for hackers on the software side. These vulnerabilities do not necessarily have
12%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
ready to copy and paste in Listing 1, which has been tested in a freshly installed Ubuntu 24.04. The dependencies are important (the Rust package manager Cargo, the TLS/SSL implementation of Open

« Previous 1 ... 117 118 119 120 121 122 123 124 125 126 127 128 129 130 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice