Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (300)
  • Article (49)
  • News (38)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 39 Next »

48%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
Rubén Llorente ... offers a whole range of models with different capabilities, with prices ranging from EUR29 to 109 (VAT not included; or about $25--$88). They also produce a line of Qubes OS-certified laptops and Nextcloud
35%
ISC’13 Now Accepting Proposals and Abstracts
06.12.2012
Home »  HPC  »  News  » 
 
research centers and vendors. And, an estimated 2,500 attendees and 170 exhibitors are expected to participate in the conference in Leipzig, June 16-20, 2013. For more information about ISC’13, please visit ... The 2013 International Supercomputing Conference is now accepting abstracts and tutorial proposals for ISC’13, to be held next June in Leipzig, Germany.
33%
A Decades-old Linux Backdoor has been Discovered
24.02.2022
Home »  News  » 
 
Back in 2013, during a forensic investigation, the Advanced Cyber Security Research team from Pangu Lab discovered a rather elusive piece of malware. Between 2016 and 2017, the hacker collective ... Bvp47, linked to the NSA, originally discovered in 2013 by Advanced Cyber Security Research and widely ignored, has finally been detected and tagged.
33%
Criminal Crypto Defeated Cops Nine Times in 2013
09.07.2014
Home »  News  » 
 
According to a report in the Register, the US government reported nine cases in which they were prevented from eavesdropping due to cryptography in 2013. This total is more than double the four ... Criminal Crypto Defeated Cops Nine Times in 2013
30%
New Exchange standard
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sermax55, 123RF.com
Exchange 2013 initially supported Remote Procedure Call (RPC) over HTTP for Outlook Anywhere as the only access protocol. Although it offered many benefits, it also put obstacles in the way of many ... Service Pack 1 for Exchange 2013 introduced a new protocol, which has become the default in Exchange 2016: MAPI over HTTP.
29%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
processor (Foundation). This is, however, only an exception in Windows Server 2012 R2, because CALs for Windows Server 2008 R2 are valid in neither Windows Server 2012 nor Windows Server 2012 R2. Conversely
28%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
Server 2008, 2008 R2, 2012, 2012 R2 (x86, 64), Windows 7 and 8 Linux Debian 6/7, Kali Linux, Fedora 20/21, Red Hat ES 5, CentOS 5/6/7, Oracle Linux 5/6/7, Red Hat ES 6/7, SUSE 10/11, Ubuntu ... SecurityX-Ray
28%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
5.25 Sandy Bridge EP (2012) 16 (8) 78 4.88 Sandy Bridge EP (2012) 12 (6) 78 6.5 Sandy Bridge EP (2012) 8 (4) 78 9
27%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
developments in the open source groupware alternatives PostPath, Kerio, Kolab, Open-Xchange, Scalix, Tine 2.0, Zarafa, and Zimbra. PostPath Somewhat unlucky in its hunt for customers, PostPath [1] used to have
27%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
Red Hat massively expanded its cloud portfolio during 2012. This overview can help you evaluate Red Hat’s products in the context of VMware and others. ... systems (SAN, iSCSI, NFS) without stopping the machine. Red Hat Enterprise Virtualization 3.1 version 2.0, which became available in June 2012, can be combined with the GlusterFS-based Red Hat Storage ... Red Hat massively expanded its cloud portfolio during 2012. This overview can help you evaluate Red Hat’s products in the context of VMware and others.

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice