Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (707)
  • Article (161)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 101 Next »

17%
Most Devices Remain Unpatched Against FortiGate Vulnerability
07.07.2023
Home »  News  » 
 
-27997 is a remote code execution in FortiGate VPNs, which are included in the company’s firewalls, Goodin says. And, although Fortinet released updates patching the flaw on June 8, many admins have yet to install
17%
IT Priorities for 2023
13.07.2023
Home »  News  » 
 
The 2023 IT Priorities Survey from ITProToday pinpoints technologies and trends that are important to organizations today, including: Cybersecurity Enabling remote workforces Cloud
17%
Licensing Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Andrew Neilan, 123RF.com
access licenses (CALs) and Remote Desktop client access licenses (RDCALs) are still required in Windows Server 2012, but only for the Standard and Datacenter editions (Figure 2). Again
17%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
Windows or any type of window manager or similar tool. Command-line editors allow you to edit files on a server that doesn't have X running or installed. This can include SSH-ing into a remote server, using
17%
Let the editor wars begin!
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Kirill Makarov, 123RF.com
-ing into a remote server, using a parallel shell tool to run commands on multiple nodes, or both scenarios. Considering that, many times, compute nodes don't have X installed, being able to triage, debug, and fix
17%
Bluetooth Vulnerability Makes Spying Easy
28.08.2019
Home »  News  » 
 
pairing to secure their connection.” The vulnerability exposes billions of smartphones, laptops, and industrial devices. There is nothing users can do to protect themselves at this time. According
17%
Parallel Julia – Jumping Right In
29.06.2012
Home »  HPC  »  Articles  » 
that Julia provides two built in primitives: … remote references and remote calls. A remote reference is an object that can be used from any processor to refer to an object stored on a particular processor
17%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
for Windows Assessment Console (WAC). When installed on a laptop, WAC offers tests mainly optimized for evaluating the system's battery life (Figure 3). To work around this problem, you can select the Run
17%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
by the install script; as a result, they access their DNF repositories over the Internet. Figure 2: IBM hosted (remote) Internet DNF repository. For an AIX
17%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
distribution and remote desktop administration are no longer issues. Version incompatibilities and conflicts can be solved at a single point of administration. The processes for providing desktops can

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice