Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (351)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 39 Next »

68%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
do not just need to deal with one container, but with several, and they typically have to be rolled out in a certain way. As for normal packages, containers often have dependencies. Sometimes
68%
Back up virtual machines and clusters
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © ximagination, fotolia.com
normal operation. In case of a sudden power failure or a similarly serious event, the modified region table (MRT) file can also help. This table is maintained in write-through mode and has coarser tracking
68%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
a hostile environment in which exploits can appear. The nature of the numerical code that scientists normally write and execute can lead to memory corruption issues specific to arrays that, under some obscure
68%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
requirements. Infos Avira: https://www.avira.com Avira Rescue System: https://www.avira.com/us/start-download/product/2275/-I12e2mvtstLKUkGnG-U3eKJ0u0Ef8c Comodo: https://www.comodo.com
68%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
data) Data that is usually considered personal information in Germany, such as driver's license and passport numbers. Israel: PII data Information that is normally considered
68%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
, the choices were Ubuntu's metal as a service (generically, MaaS, but MAAS when referring to Ubuntu's implementation) [2], Juju [3], and Autopilot [4]. With this tool mix, even newcomers can quickly establish
68%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
. The attachment can then be examined and analyzed before it finds its way to the recipient. Of course, automated systems must have allowlists, but normal users in your company and their counterparts can usually
68%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
in solving encryption issues. In true DevOps fashion, I fire up Endlessh with a Docker container: $ git clone https://github.com/skeeto/endlessh If you look at the Dockerfile within the repository, you can
68%
Office 365 vs. Google Apps
19.01.2012
Home »  Articles  » 
 
contacts and then chat with the contacts or make audio or video calls. To use all of Lync Online’s features, you will need the Lync Client (Figure 3), which is currently only available for Windows
67%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
a processor with several cores and a normal clock speed. Therefore, more cores are not always significantly faster than fewer cores. Above all, Hyper-V performance benefits from clock speed, because

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice