Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1337)
  • Article (104)
  • News (104)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 155 Next »

34%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
-changing commands and wreak havoc in your environment. Infos PowerShell: http://technet.microsoft.com/en-us/scriptcenter/dd742419.aspx Microsoft support pages: http://support.microsoft.com/kb/96892
34%
Generating information with the touch of a button
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
://www.gnuenterprise.org/tools/reports OpenReports: http://sourceforge.net/projects/oreports/ Hibernate: http://www.hibernate.org OpenRPT: http://www.xtuple.com/openrpt OpenRPT download: http
34%
Operating system virtualization with OpenVZ
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© sculpies, Fotolia.com
. Infos Linux VServer: http://linux-vserver.org/Welcome_to_Linux-VServer.org OpenVZ: http://wiki.openvz.org/Main_Page Virtuozzo: http://www.parallels.com/de/products/pvc45 User-Mode Linux
34%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
investing time and effort in AD security, because AD will be with us for quite some time. Infos "Designing a Secure Active Directory" by Evgenij Smirnov, ADMIN , issue 86, 2025, pg. 86: https://www.admin-magazine.com
34%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
] Windows Server 2008 R2 and Juniper: [http://www.corelan.be/index.php/2009/01/11/IPsec-vpn-between-windows-server-2008-and-juniper-screenos/] [4] TechNet article on IPsec debugging: [http://technet.microsoft.com
34%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
or setting up GPUs on the head and compute nodes and configuring them in Slurm as a consumable resource [5]. Infos Nodes: https://www.admin-magazine.com/HPC/Articles/Warewulf-4 chrony: https
34%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
/01/11/IPsec-vpn-between-windows-server-2008-and-juniper-screenos/ TechNet article on IPsec debugging: http://technet.microsoft.com/en-us/library/cc754714%28WS.10%29.aspx Juniper SRX series: http://www
34%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
at [http://thomasjoos.spaces.live.com].
34%
What’s New in Microsoft Windows 8.1
21.01.2014
Home »  Articles  » 
can meet him at http://thomasjoos.spaces.live.com.
34%
Mobile PC Monitor
20.02.2012
Home »  Articles  » 
 
, but if you’re more mobile than a typical console watcher, you require a mobile application. MMSOFT provides an online service at https://my.mobilepcmonitor.com; just log in to check on your inventory. You can

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice