Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 48 Next »

68%
Jelastic: Java and PHP as a service
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Melinda Nagy, 123RF.com
applications. Testing of the Jelastic service for this article was hosted by dogado GmbH [2]. The public Jelastic cloud resides in a TÜV-certified data center operated by Host Europe [3] in Cologne, Germany
68%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
; there is no longer a requirement for a physical server name, as for a normal drive letter. SMB 3.0 in the Enterprise SMB 3.0 is much more robust, more powerful, and more scalable and offers more security than its ... Microsoft has introduced several improvements to Windows Server 2012 and Windows Server 2012 R2 with its Server Message Block 3. Hyper-V mainly benefits from faster and more stable access to network ... Hyper-V with SMB 3 ... Hyper-V with the SMB 3 protocol
68%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
by support from Linux Professional Institute Info [1] DebOps: https://debops.org [2] Ansible packages: http://docs.ansible.com/ansible/intro_installation.html [3] Pip: https://pypi.python.org/pypi/pip [4
68%
U-Move backs up, restores, and migrates Active Directory environments
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Erda Estremera on Unsplash
to decide between an Authoritative Restore or Non-authoritative Restore . In the case of the third option, Normal Restore , U-Move would merge the contents of the SYSVOL shares of several DCs in the case
68%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
and faster than a human could, but they cannot design them. © Kittipong Jirasukhanont, 123RF.com ADMIN: That would be a metaphor for powerful AI then? But even weak AI can do many things faster
68%
Live Kernel Update Tools
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Andrea, Fotolia.com
to be equivalent in terms of functionality: Kpatch [2] and kGraft [3]. Technically, the two approaches have major differences with widely divergent functionality. Perhaps this divergence is why Red Hat and SUSE
68%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
identifies the owner. Under normal circumstances, the owner should be the only person who has the key to access. When generating a password, the user faces two challenges: the need to generate a secure
67%
Network monitoring with Total Network Monitor
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Tono Balaguer, 123RF.com
to provide a good overview. In map view, you can also add or remove devices, just as in the normal tree view. Integrating Servers and Services To monitor servers and services, start the device integration
67%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
(Figure 3). In subsequent test runs, you can compare the results with a previously saved map; devices added or removed are listed in each category. Figure 3
67%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
cases, network services are not disrupted by the attack. Services continue to run normally while the attacker accesses the traffic between the client and the server. Identity theft, faked transactions

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice