Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 98 Next »

9%
We interview Red Hat CEO Jim Whitehurst
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Jim Whitehurst
organization. It's going to take time. The first step is everyone needs to agree that these shifts have to happen.
9%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
between messages, if necessary, (3) track the results, which Gophish visualizes in real time on its dashboard. Preparing a Campaign On Windows you launch the environment by running gophish.exe; on mac
9%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
, for the four slots. The master node has the node name controller.local . After setting up the master node, the ClusterHAT, and the compute nodes, it's time for the first boot! First Boot Booting is pretty
9%
Network Grep
26.11.2012
Home »  Articles  » 
 
hand, you might need to check the exact nature of an attack to perform some real-time forensic diagnostics to circumvent it. Leaving the networking aspects entirely aside for a moment, even an admin
9%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
access for each participant. Monitoring users' systems in real time is possible through logfiles by using simple commands. The creation of user accounts and allocation of containers for each user
9%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
a preview of the table in its configuration dialog. Opening a Connection The next step is to relate the imported data to each other. If you are familiar with databases, you know that the best way to do
9%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
workspace, which is an environment deployed in Azure to store, manage, and analyze log data from services such as Azure Monitor, Microsoft Sentinel, or Microsoft Defender for Cloud. Each workspace has its own ... capabilities to servers in traditional data centers or any other cloud environment. We show you how to get Azure Arc up and running and look at its key features.
9%
Security features in Windows Server 2022
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Matthew Henry on Unsplash
Compared with Windows Server 2019, spectacular changes to Windows Server 2022 are few and far between. However, the sum total of improvements make the latest version a more secure option than its ... The release of Windows Server 2022 adds some new security features to its server operating system that might not be earth-shattering; however, you will find Secured-core, DNS over HTTPs, TLS 1
9%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
as if it were replicated a fixed number of times and all copies were executed asynchronously. Each copy has its own set of data objects and is called an image. The array syntax of Fortran is extended
9%
MySQL as a Service
21.12.2012
Home »  CloudAge  »  Articles  » 
 
-as-a-service (SaaS) offerings, such as hosted MongoDB and the NoSQL pack, as well. This time I’m going to give a quick tour of the available MySQL-as-a-service products, although I should say LLMaaS – looks like My

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice