Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 158 159 160 161 162 163 164 165 166 167 168 169 170 171 ... 261 Next »

36%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
introduced in 2007. In fall 2023, the NVM Express (NVMe) committee adopted a new procedure for optimal data placement on flash memory: flexible data placement (FDP) [1]. FDP is defined in NVMe technical
36%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
In the list of the managed Kubernetes solutions that dominate the market, the usual suspects are present, operated by the most popular cloud platforms: Google Kubernetes Engine (GKE), AWS Elastic
36%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
": "127.0.0.1"}}, 06 { "type": "PORT", "params": {"hostname": "129.0.0.1", "port": 8080}}, 07 { "type": "HTTP-STATUS", "params": {"url": "https://google.com"}}, 08 { 09 "type": "GROUP", 10
36%
Getting Past the Passion for Passing on Dysfunctional Practices
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Emil Imarietli, 123RF
" images or the deployment of new systems in general. The practice of doing it wrong filters through generations of administrators. The reason this happens is that, as organizations grow or turn over, one
36%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
network tunnels Displaying the link-layer information (MAC addresses, etc.) Configuring Quality of Service (QoS) Management features cover both IPv4 and IPv6, and new features are implemented
36%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
Google's software product Flutter [1] is not the first attempt to unify mobile app development. Competitors like Microsoft's Xamarin or Facebook's React Native already offer solutions in the same ... Developing apps in the past for Android, iOS, the web browser, and the desktop meant having to write different versions of the code; however, that's no longer the case thanks to Google's Flutter
36%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
to use for a specific system. Additionally, jump hosts have a certain amount of administrative overhead for user accounts. RPort with a New Approach RPort [1] aims to solve this remote access problem
36%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
on the left-hand side of the browser, even without Active Directory (Figure 1). Users can create new libraries via the context menu of an existing library or modify the settings for standard libraries
36%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
. The new installation will reside in /opt/nessus and will install over the top of any previous Nessus versions. Start the nessus daemon and open your web browser to https://localhost:8834 , then log in, go
36%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
The shiny, new content management system is just waiting to be fed with content by a plethora of users. To prevent them from getting into mischief, they all have to authenticate using a password

« Previous 1 ... 158 159 160 161 162 163 164 165 166 167 168 169 170 171 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice