Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 234 235 236 237 238 239 240 241 242 243 244 245 246 247 ... 261 Next »

36%
Discover ransomware with PowerShell
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Andrea Danti, 123RF.com
the cybercriminal of any chance of the ransomware spreading further because the demand notifies the security industry that the ransomware exists. As a result, delayed file encryption is a new ransomeware approach
36%
Dialing up security for Docker containers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Dmytro Demianenko, 123RF.com
the processes outside the container – provided that there is no vulnerability in the namespace implementation of the Linux kernel. Docker also creates control groups for new containers. Control groups limit
36%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
-scripting mysteries, and takes his McFlurry shaken, not stirred. You can read more from him in the new O'Reilly title AWS System Administration .
36%
Developments in storage management
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by DESIGNECOLOGIST on Unsplash
. Docking Containers with CSI Strong growth in the area of unstructured files and the resulting increasing attractiveness of object storage for new applications underlines the need for comprehensive
36%
Finding the fastest SD cards for the Raspberry Pi
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Lucy Baldwin, 123RF.com
" at SUSE. He enjoys arcane hardware issues and shell-scripting mysteries and takes his McFlurry shaken, not stirred. You can read more from him in the new O'Reilly title AWS System Administration .
36%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
systems on the Internet. For example, IceWarp supports ICQ, Google Talk, Yahoo, or Facebook chat. Administrators can define which networks to allow. The IM feature is based on XMPP (Jabber). Companies
36%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
the actual predictive ability of SMART data, despite a study of more than 100,000 disks at Google [7]. Yet, Reallocated Sector Count (Table 1, attribute 5) remains a key monitoring metric of both solid state
36%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
a 32GB USB (or larger) drive or you purchase one new for this project matters little because you have to wipe it clean before use, so be sure Windows To Go is what you want on this drive before you start
36%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
of the gridded assembly area. Double-clicking on the component opens a new dialog box in which you should define the properties of the component (Figure 2). The definitions include the path to the input file
36%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
how a new IP address is queried by DHCP, which is how clients communicate with the network and DHCP servers communicate with clients. The data can be displayed onscreen thanks to Wireshark. Sniffing

« Previous 1 ... 234 235 236 237 238 239 240 241 242 243 244 245 246 247 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice