Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (222)
  • Article (70)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 34 Next »

23%
Highly available Hyper-V in Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Andrea Danti, 123RF.com
cluster nodes by live migration, and the cluster node is removed from the cluster for two hours. A maximum of 20 percent of the cluster nodes can be switched to isolation mode. In the second mode, cluster
23%
Top PowerShell Cmdlets
14.05.2013
Home »  Articles  » 
 
Server 2008 R2 and in the new PowerShell 3.0 for Windows Server 2012. Besides specifying the role and feature names, you can use an XML control file in PowerShell; this file is created in the last
23%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
Server 2008 R2 and in the new PowerShell 3.0 for Windows Server 2012. Besides specifying the role and feature names, you can use an XML control file in PowerShell; this file is created in the last
23%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
permission from a strictly numeric point of view. When you view a file list, you’ll only see the letters. For example, here are a few files from my home directory: drwxr-xr-x 2 khess khess 4096 2012
23%
Software-defined networking with Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Kirill Cherezov, 123RF.com
2016, but also on Server 2012 R2. Therefore, virtual switches, appliances, and other areas of virtual networks can be monitored and controlled centrally. The Network Controller works closely together
23%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
, Failed 2012-01-09 20:49:17, 8108, 414.12, 4, 0.78, 19.58, 0.01, 15.18, 8175, 72 2012-01-09 20:49:30, 68, 2.38, 0, 0.45, 28
23%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
systems in the cloud. In addition to hardware devices, you can also manage software-based network services with the Network Controller, which runs on both Windows Server vNext and Windows Server 2012 R2
23%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
the market about 20 years ago with Windows 2000 Server. However, it was to be 13 years before Server 2012 R2 introduced one of the biggest security enhancements in the form of Kerberos authentication
23%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
on a Core server; you need a full installation of Windows Server 2008 R2 or preferably Windows Server 2012. You can also install the Exchange Server 2013 management tools on workstations with Windows 7
23%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
standard. In October of 2012, the winner was chosen: the Keccak algorithm, which was developed by a team of Belgian scientists. This is the second competition of this type: The symmetrical encryption

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice