Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 154 Next »

12%
Valkey 8.0.0 Released
18.09.2024
Home »  News  » 
 
major versions of Redis that precede it by bringing improvements to speed and efficiency alongside new features,” says Kyle Davis, Senior Developer Advocate on the project. The changes and features
12%
Rapid7 Announces MDR for Enterprise
01.05.2025
Home »  News  » 
 
Tailored threat monitoring Engagement model and collaboration MDR for Enterprise also lets you bring your own log sources and extend monitoring into non-standard systems. “Whether it's a homegrown
12%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
Server DVD and calling up the computer repair options. At the command line, you have various options for reactivating a defective boot manager. The bootrec /fixmbr command overwrites the master boot
12%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
Authentication Multifactor authentication (MFA) – also called two-factor authentication, two-step verification, TFA, T-FA, or 2FA – is an authentication approach that requires two or more core factors
12%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
application when calling it is also possible. Path specifications, in turn, need to comply with Windows conventions. X11 Applications with RDP At the command line, at least, WSL brings Windows and Linux
12%
News for Admins
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
 
Administration (NOAA) to launch a new supercomputer dedicated to climate science research, which will be one of three NOAA computers operating at ORNL. The new system, called C5, is an HPE Cray machine with more
12%
News for Admins
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
 
called PRoot (https://proot-me.github.io/) to expand the scope of their operations to multiple Linux distributions." Typically, the researchers note, attacks are "limited by the varying configurations
12%
The role of open source in enterprise storage solutions
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Swapnil Bhartiya
all of the business units, across legal marketing, engineering, strategy, etc. In fact, there are a few highlights for this year that I can call out: We have had more speakers than we have ever had
12%
SUSE Goes to Washington:
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Images © Swapnil Bhartiya
is engaged with Cloud Foundry. They also talked about a new operating system, called Micro OS, which SUSE is working on. Dr. T. mentioned that SUSE had all the tools and technologies required for DevOps even
12%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
Within a couple of hours, an experienced Internet attack specialist can bring your server infrastructure to its knees. In many cases, the barn door through which the attackers gain entry

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice