Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (661)
  • Article (151)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 91 Next »

14%
Network traffic utilities bandwhich and iftop
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Ildar Galeev, 123RF.com
, uncompressed, it sits at only 6MB, which is still a far cry from 328MB that the Cargo route would have introduced to my laptop. To see whether the binary was compatible with my system, I ran as root
14%
Linux Systems Vulnerable to Attack
20.02.2020
Home »  News  » 
 
A number of laptops have been discovered to be vulnerable to attack. The security research group Eclypsium has discovered that hardware made by Dell, HP, and Lenovo can contain unsigned firmware
14%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
14%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
-reaching authorizations without immediately setting off the alarm bells on monitoring systems. Sometimes these techniques result from the functionality of Windows and Active Directory (AD). Stolen and Broken
14%
Data center management with Ralph
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © ffzhang, 123RF.com
functions for managing, monitoring, and planning the data center infrastructure and the IT systems installed there. DCIM in particular makes a significant contribution to the optimization and efficient
14%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
-foreman-ui-plugin.html Nagios/Icinga monitoring http://labs.ovido.at/monitoring/wiki/ovirt-monitoring-ui-plugin RHEV-H servers provide the virtual machines. Each active VDI instance requires one. RHEV
14%
IBM Might Sell Small Server Business
21.01.2014
Home »  News  » 
 
several years ago. Spreading into the server space is a natural fit for Lenovo, with its specialty in high-end laptops and workstations for business customers. One can only imagine that Lenvovo is offering
14%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
where I left off, I'll try find out everything that my laptop knows about its internal drive (Figure 1). Figure 1: Intel SA2M080G2GC, an Intel 320 second
14%
AMT Flaw in Intel Chips Allows Attacker to Create a Backdoor
16.01.2018
Home »  News  » 
 
F-Secure researchers have found a way to exploit the security flaw in AMT that allows a local attacker to backdoor almost any corporate laptop in a matter of seconds, even if the BIOS password, TPM
14%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
How to manage storage is a very popular question with a simple, single answer: It depends. Let me explain. Because of the many aspects of managing storage – from design, to monitoring, to user

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 91 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice