Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (274)
  • Article (9)
  • News (9)
Keywords

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 30 Next »

9%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
/400 $5.63 https://thepihut.com/products/sleeve-for-raspberry-pi-400 Raspberry Pi 27W USB-C power supply $12.83 https://thepihut.com/products/raspberry-pi-27w
9%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
are missing, potential causes include invisible SIP traffic, incorrect selection of the network interface, or missing permissions. Your first step is to check whether SIP traffic exists sudo tcpdump -i eth0
9%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
management engine with power optimization software, all on one piece of silicon. The EnergyCore SoC also includes a full complement of server I/O features and a large 4MB ECC L2 cache. To learn more, visit
9%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
desktop license provides access to process mining on desktops and 50MB of process mining data storage, which can be expanded to up to 100GB per tenant. Power Automate Premium also provides AI tools
9%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
9%
SUSE Offers Cloud Sovereignty Framework Self Assessment
05.02.2026
Home »  News  » 
 
organizations quickly see how their infrastructure measures up against the 2025 EU Cloud Sovereignty Framework, providing an analysis that includes: Overall sovereignty score (0-100%) Individual scores
9%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
've logged in to the app, you'll see your monitored computer inventory in the Computers list in the left pane. Tap one of the systems to view its details and see an overview, (Figure 12). In Figure 13, you see
9%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Helder Almeida, 123RF.com
://www.microsoft.com/en-us/office365/deployment-support.aspx Exchange Autodiscover: http://www.msxfaq.de/e2007/autodiscover.htm Office 365 e-book download: http://download.microsoft.com/download/1/2/F/12F1FF78-73E1-4714-9A08-6A76
9%
Our Technological Enlightenment
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© lightwise, 123RF.com
the numbers, sizes, capacities, and prices of the 1990s with those of today. For example, in 1995, a 500MB hard disk was considered large; today, my iPhone 4 has a 16GB capacity, of which I have just over 6GB
9%
AlmaLinux OS 10 Released
04.06.2025
Home »  News  » 
 
The AlmaLinux OS Foundation has announced the release of AlmaLinux OS 10.0 (codenamed Purple Lion), which focuses on improving usability while maintaining compatibility. “With an unwavering eye

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice