Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 261 Next »

36%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
than 4GB of RAM. If your setup is not too large, you should be able to back up the environment's new data and the metrics data history for around a year on 500GB. Debian GNU/Linux 12 is strongly
36%
Welcome
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © archman, 123RF.com
, or is social engineered into providing access to your internal systems. These threats turn your hair as white as the sands of White Sands National Park in New Mexico. Find photos of yours truly for reference
36%
Welcome
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © xtrekx, 123RF.com
that they need or want to do. Whether you help programmers create new software, keep servers alive so that customers can buy groceries, or support gaming systems, you have a purpose: to help others
36%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
" " >sha256sum_nessus You will now find the new sha256sum file in the directory. Next, compare the checksum of the installation file by typing sha256sum -c sha256
36%
Manage and automate networks
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
structure. Architecture and Components StackStorm works on the principle of "if A, then B," which means that any event on a network or system, be it the addition of a new server or the receipt of a specific
36%
Welcome
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © nexusplexus, 123RF.com
, involving some rebuilds, new database replicas, and reversals during the troubleshooting marathon. In the end, it was a lesson learned. There were a few firings – but not enough, in my opinion. Saying, "I
36%
SC25 Highlights
20.01.2026
Home »  Articles  » 
 
and power and cooling. As always, though, you want to see what’s new from the various vendors and what surprises are announced or shown. TOP500 – Meh or Interesting? Many people get excited about the TOP500
36%
Welcome
05.02.2026
Home »  Archive  »  2026  »  Issue 91 AI in...  » 
Lead Image © alexandersikov, 123RF.com
remotely. One of the primary reasons for this new "benefit" was to test the waters for offshore outsourcing. If it can be done remotely, why not get it done cheaper? I won't begin to tell you how that trend
36%
Instant Gratification – The End of Server Admins?
28.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
I am convinced that over the next few years we will see the end of server admins and, to an extent, developers. If you take into account investment in new projects, time to turn around current
36%
Secure Alternative to FTP
23.07.2013
Home »  Articles  » 
 
(SFTP). A new addition was made in 2008, Managed File Transfer (MFT), in which all files to be transferred are encrypted not only en route but also during storage on the server or on share points. Core

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice