Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1562)
  • News (445)
  • Article (316)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 234 Next »

17%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
Partition alignment changes as drives evolve, and proper alignment is necessary for maximum performance. We provide some tips to help you get things back in order.
17%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
The Veil pen-testing platform provides some powerful tools that will hide your attack from antivirus scanners – and Veil even supports Metasploit payloads.
17%
Risky Business
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Oksana Stepanenko, 123RF.com
laptop. Yes, some cloud services have been compromised. Still, if you take precautions, such as selecting providers that encrypt your data and enabling multifactor authentication, you have less to worry
17%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
With the recent rise in cloud computing, most cloud providers have offered their own APIs, which means cloud users sign up for the services of individual providers at the expense of being able ... With the recent rise in cloud computing, most cloud providers have offered their own APIs, which means cloud users sign up for the services of individual providers at the expense of being able
16%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
with the lightweight and fast bring up/bring down behavior of containers to create a cloud VM kind of stack on a laptop? Can you also have the tooling that provides a declarative automation experience? The answer is yes
16%
Service management by the book
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Michael Flippo, Fotolia.com
Over the past few years, companies have changed the way they look at IT. Companies now view IT as a service provided from one department to another, or perhaps provided to customers. This has led ... Providing the necessary IT services to your employees or customers is more than simply logging tickets and keeping track of hardware. We compare several ITIL-compliant help desk packages.
16%
ClearOS 7 Community Edition and Kali Linux
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
 
  ClearOS 7 Community Edition (64-bit Install) ClearOS [1] provides a simple and easy ... ClearOS provides a simple and easy-to-use platform for all layers of the IT environment. Offensive Security bills Kali Linux 2017.1 as their “most advanced penetration testing distribution, ever”.
16%
Infrastructure as Code with Terraform
20.06.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© fotolia.com
way. Terraform can speak to multiple cloud providers, making it highly flexible and offering management teams a somewhat conditional promise of having the ability to run cloud-agnostic infrastructure ... With the Terraform configuration management tools and the Amazon Route 53 DNS service, you can configure AWS to provide geographically diverse failover between two web servers.
16%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
) is fundamental (level 1). Anyone processing personal data cannot simply do so in the public clouds of providers outside the scope of European data protection regulations. The EU Commission's adequacy decisions may ... The Sovereign Cloud Stack promises no less than liberation from the shackles of vendor tie-in. Cloud users who rely on this technology are free to choose their provider and switch, without further
16%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
Heartbleed in 2014, a vulnerability in OpenSSL, and Log4j in 2021. In both cases, innumerable systems were affected. Back in May 2021, the United States introduced an obligation to provide a software bill ... Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 234 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice