Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (377)
  • Article (122)
  • News (23)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 53 Next »

29%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
authentication on the basis of text messages. Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
29%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
, is giving up control – of the hardware, your data, and so on – to a provider. What Is the CSA? Ask, "What is cloud computing?" 100 times, and you'll get 100 different answers. Start asking about cloud
29%
Installing .NET on Linux
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © 36clicks, 123RF.com
. This happened about six months before .NET version 4.6 appeared. These events prepared the way for a larger community to be able to work on pushing development of the framework forward. Pressure from Java
29%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
, repeating the measurement 100,000 times leads to an approximate time measurement of 6ns for the round n Figure 4: Bench testing round() in C: 6.23ns fast
29%
RSQL, a Microsoft SQL clone
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Eugenio Mazzone on Unsplash
requirements for using RSQL are a 64-bit system with only 100MB of RAM; 100MB of disk space is sufficient. Basic knowledge of SQL and its syntax are useful for operations. Installation instructions are available
29%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
can enter the address in the browser, but then you have to change the DNS resolver for your browser or system. For example, if the 6fz.one domain is on your blacklist, you could simply enter: dig 6fz
29%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
containers can be found online [6]. For a better understanding of the setup, a brief introduction to the OpenShift PaaS framework follows before I then look at the configuration of the storage system. Open
29%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
desktop license provides access to process mining on desktops and 50MB of process mining data storage, which can be expanded to up to 100GB per tenant. Power Automate Premium also provides AI tools
29%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
recorded an HPCG performance of 16,004.5 TFLOPS. On the latest TOP500 list, November 2024, Frontier was number 2, with El Capitan becoming number 1, and Fugaku slipped to number 6, but remained number 1
29%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice