Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 171 Next »

12%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
) Intel Atom D2701, 2.13GHz (dual core) RAM 4GB 0.5GB 2GB 2GB Network Interface 2x 1Gbit Ethernet 1x 1Gbit Ethernet 2x 1Gbit Ethernet 2x
12%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
techniques that bring network-level attacks against TLS to the browser (e.g., HEIST). Just as the community started thinking the worst was over, ROBOT (Return of Bleichenbacher's Oracle Threat), managed
12%
EGroupware, Group Office, and Kopano compared
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © 36clicks, 123RF.com
month, with special offers for schools and clubs. An on-premises solution, several variants of which are available, supports use on dedicated servers on internal company networks under several price
12%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
If you think of Wikipedia first when considering a freely expandable, hierarchical knowledge database, you are not totally wrong, but you have overlooked one classic example: The Simple Network
12%
News for Admins
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
 
of commands as root, and port forwarding of network traffic. Worst of all, Drovorub implants a kernel rootkit, which is enhanced with additional capabilities. To mitigate Drovorub, admins are warned to upgrade
12%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
-compatible runtime Storage Image Networking Container monitoring All have their own GitHub repositories [4]. The CRI-O site has more information on these repositories, as well. To keep CRI-O minimal
12%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
new system roles for identity management configuration, certificate management, Network-Bound Disk Encryption (NBDE), kernel settings, log settings, SAP HANA, SAP NetWeaver, and management. There have
12%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
's feature set not only to query status information but also to create new systems or define other virtual resources, such as networks. On Fedora systems, the Python bindings are provided by the libvirt
12%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
storage … Yes Yes On local network Git   Yes Yes Yes Git Object storage … by the user? Yes Yes
12%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
to encrypt data that is transmitted across a network between a client application and an instance of SQL Server. SQL Server on Linux supports TLS protocols 1.2, 1.1, and 1.0. Machine Learning Services

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice