Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (222)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 147 Next »

21%
SUSE Linux Enterprise 11 SP3 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mario_Paufler, 123RF.com
also updated their separately downloadable driver pack for SLE guest systems [2] to version 2.1. This includes the virtio drivers (disk, network, and memory/ballooning) for all Microsoft operating ... SUSE has released the third update of its enterprise distribution. Along with updated software and bug fixes, Novell has added new drivers, storage and networking improvements, and support for UEFI
21%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
BIOS information and hardware or network infrastructures. Even many PowerShell cmdlets, such as Get-Hotfix, encapsulate classes defined by this legacy standard. Platform-independent availability makes ... The combination of Open Management Infrastructure standards and the performance of Windows PowerShell opens new perspectives on heterogeneous networks, making PowerShell a realistic option
21%
Automating system configuration with Ansible AWX
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Rungaroon taweeapiradeemunkohg, 123RF.com
Ansible automatically configures computers and routers on a network. Administrators typically define the instructions to Ansible by manually editing text files. Red Hat offers Ansible Tower ... Ansible is a powerful tool for automating the configuration of computers across the network. Red Hat developed Ansible Tower as a handy interface for managing Ansible. AWX is the freely available
21%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
Linux filesystems range from block-based network filesystems, to temporary filesystems in RAM, to pseudo filesystems. We explain how filesystems are set up and how to manage them.
20%
Tails: The Amnesic Incognito Live System
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Geared toward preserving privacy and anonymity, Tails comes with an impressive set of cryptographic tools. All connections to the Internet go through the Tor network, which "… protects you ... with an impressive set of cryptographic tools. All connections to the Internet go through the Tor network. The Tor anonymity network is designed to leave no trace and prevent surveillance of your online activities.
19%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
to network storage especially benefits enterprise applications, such as SQL Server and virtual disks in Hyper-V. The disks of virtual servers can reside on the network with Windows Server 2012 R2, for example ... Microsoft has introduced several improvements to Windows Server 2012 and Windows Server 2012 R2 with its Server Message Block 3. Hyper-V mainly benefits from faster and more stable access to network
19%
CentOS 7-1708 and Tails 3.5
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
designed for easy access to the TOR anonymity network. The TOR network lets the privacy-conscious user surf the web invisibly without fear of identification. The latest Tails release includes version 7 ... system designed for easy access to the TOR anonymity network.
19%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
Nessus is a network and vulnerability scanner for Windows, Linux, Unix, and Mac OS X computers. The software relies on the client/server principle; one Nessus server on the network runs nessusd ... To ensure your servers and workstations are well protected against attacks on your network, you need a professional security scanner. In version 6, Tenable has substantially expanded its Nessus
19%
CentOS 7 (1511) and Rockstor 3.8
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
for identity management, containers, and software-defined networking. Rockstor 3.8 Rockstor is a specialty Linux distro designed to support Btrfs-based network-attached storage (NAS) devices. You can set up ... to support Btrfs-based network-attached storage (NAS) devices.
19%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
protocol, attached to HTTP(S), accepts requests on defined ports via a listener. The guest and host are thus confined to communicating through some form of virtual networking. Another option for VM ... to configure a virtual network connection.

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice