Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (119)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 140 141 142 143 144 145 146 147 148 149 150 151 Next »

15%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © crazymedia, 123RF.com
in combination with Hyper-V or other hypervisors. Azure Site Recovery (ASR) is Microsoft's disaster recovery as a service (DRaaS). Thanks to ASR, companies can replicate their Hyper-V VMs in Azure and restore them
15%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
Zulip [1], Mattermost [2], and Rocket.Chat [3] and discover how well these platforms integrate with other applications. Functions and Features A number of questions should be considered when looking
15%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
order) option on the server in the Advanced TCP/IP Settings dialog (Figure 3). Next, enter the namespace of your own tree first and then append the namespaces of the other trees. The purpose
15%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
offer options that automatically identify and warn you about distributed denial of service (DDoS) attacks so that you can immediately block the attack at the network level. Although these solutions
15%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
storage that uses other protocols, such as Amazon Web Services (AWS) Simple Storage Service (S3) buckets, NFS, Google Drive, Microsoft OneDrive, Backblaze, SFTP and SSHFS, Nextcloud, and others. All
15%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
still don't account for the 24 million users that the Open-Xchange managers claim, but widespread use does make the value of the SaaS variant of the product within the company very clear. Instead
15%
How to query sensors for helpful metrics
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by patricia serna on Unsplash
need a server with a network bridge and a Podman network of the Bridge [3] type. You will find various how-tos online to help you create a bridged container network of the macvlan type. However, if you
15%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
. This means that external storage like Dropbox, Swift, Google Docs, Amazon S3, or WebDAV can be grouped with internal or external ownCloud servers to create a hybrid cloud in the recently released version 5
15%
Windows 10 Updates with WSUS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © sensay, 123RF.com
addressed the issue in the Knowledge Base [2]. For Windows Server 2012 R2, the KB3095113 [3] update also plays an important role; therefore, install the necessary updates on the servers. When distributing
15%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before

« Previous 1 ... 140 141 142 143 144 145 146 147 148 149 150 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice