Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (250)
  • Article (5)
  • News (3)
Keywords

« Previous 1 ... 19 20 21 22 23 24 25 26

51%
DBaaS – How they make data scale
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Rungaroon TAWEEAPIRADEEMUNKONG, 123RF.com
recently [2]. Jilk got in touch with the idea of "Model-Driven Deployment." His whitepaper [3] peddles the idea that, rather than think of operating at scale as spinning up instances that are configured
51%
Top three HPC roadblocks
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Alexey Bogatyrev, 123RF.com
involves many vendors. Like the cable/Internet industry, once the last mile problem is addressed, the HPC market can expand in many ways. Refocus Performance Goals The Top500 [3] is a great historical
50%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this, the topic is still largely overlooked and a huge amount
50%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
Certificate Services (AD CS; Microsoft's implementation of an enterprise PKI). The first systematic discussion of AD CS vulnerabilities that lead to the compromise of AD DS is mentioned in an article [3
50%
Active Directory overview
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Maksym Yemelyanov, 123RF.com
, which in turn are transitively linked [3]. Active Directory uses the DNS system's defined namespace for domain naming. Within the domain, organizational units (OUs) exist – container objects for grouping ... 6
50%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
-- "PASSWORD\r" 49 expect -exact "\r 50 Linux aspen 2.6.32-43-server #97-Ubuntu SMP Wed Sep 5 16:56:41 UTC 2012 x86_64 GNU/Linux\r 51 Ubuntu 10.04.4 LTS\r 52 \r 53 Welcome to the Ubuntu Server!\r 54
50%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
because, if you choose not to use it, there is no effect. All of the above features and others are described in greater detail in the MariaDB Knowledgebase [3]. Compatibility With MariaDB, every effort
50%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
information, such as home drives or Windows Local Administrator Password Solution (LAPS). According to MITRE ATT&CK [3], attackers derive their techniques from these three AD functions and deploy them

« Previous 1 ... 19 20 21 22 23 24 25 26

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice