Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 ... 200 Next »

12%
Fundamentals of I/O benchmarking
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
takes some getting used to; for example, the term Manager is used for Computer, and Worker is used for Thread. Iometer can be used on Windows and Linux and provides a graphical front end, as shown
12%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
. Project Abacus provides authentication through the way you use your device. Google's machine-learning capabilities can identify you by learning the way you interact with your phone: the way you type
12%
Affordable hardware switch for SDN
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © plus69, 123RF.com
image. It is not possible to complete a command with [Tab] or display the options with [?], as admins are accustomed to doing with other devices. The CLI does provide a help command. You can switch
12%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
with network namespaces: ethtool, iproute2 (which also provides the ip management tool), iw for wireless connections, and util-linux. Using namespaces is easy. For example, a very simple, isolated DNS resolver
12%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
security measures can only provide limited protection. Awareness on the part of individual users is crucial. Whenever possible, users should validate the sender, subject, and plausibility, before opening any
12%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
using Entra ID or a hybrid Active Directory, it makes sense to follow the security suggestions. Some of the comprehensive documents provide step-by-step instructions that you only need to implement
12%
Legal or litigation hold and eDiscovery in Microsoft Teams
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Robert Wilson, 123RF.com
not be discoverable now inadvertently becomes discoverable because the "shared" resources are included in the litigation hold. Summary Microsoft 365 provides a comprehensive suite of tools and features to support
12%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
could use some of the OpenSSH service's own configuration options to do this. However, this behavior was deliberately changed in recent versions of the software without providing an alternative approach
12%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
). Figure 5: Statistical values for the number of finds, the number of files searched, the time required, and more are provided by the --stats option. If you want to have a little more context than
12%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
. The practical implementation is discussed using the Leibniz data center (LRZ) as an example. The LRZ is the central IT service provider for Munich universities and colleges; it provides services to approximately

« Previous 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice