Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (208)
  • Article (63)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 Next »

39%
An overview of VMware tools
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Giuseppe Ramos, 123RF.com
of management tools, one of the most important acquisitions has been Ionix products from parent company EMC in February 2010. No less important was the acquisition of SpringSource in autumn 2009, which gave
39%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
Commission: From 2008 to 2012 the FSFE fought through a series of court cases (many antitrust) against Microsoft. The European Commission followed the FSFE's claims: Microsoft must not limit access to its APIs
39%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
at Dell and VMware. In 2012 Andreas moved to Red Hat. There, he currently works as principal solution architect in the Technical Partner Development department.
39%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
the attack surface can be enabled on Windows Server from version 2012 and Windows 10 and work without the Defender portal or group policies, even on home computers (more on this later). Armed with Defender
39%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
- Action: 63 - sts:AssumeRole 64 Effect: Allow 65 Principal: 66 Service: 67 - ec2.amazonaws.com 68 Version: 2012-10-17 69
39%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
365 and Azure AD can be done painlessly from ADFS 2.0 and newer. New developments for ADFS in Windows Server 2012 R2 are, however, worth a closer look, such as the possibilities of the Workplace Join
39%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
is Tue Aug 7 19:00:00 EDT 2012 Directory is /home/laytonjb/TEST Using 3 processors across 1 nodes End time is Tue Aug 7 19:00:01 EDT 2012 The output from the application is in output.mpi_pi : [laytonjb
38%
Matlab-Like Tools for HPC
03.01.2013
Home »  HPC  »  Articles  » 
to you. Scilab Scilab is one of the oldest Matlab-like tools. It was started in 1990 in France, and in May 2003, a Scilab Consortium was formed to better promote the tool. In June 2012, the Consortium
38%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
even added a command-line interface (CLI) with the feel of a commercial router, completing the free DMVPN router. Unfortunately, Brocade acquired Vyatta in 2012 and put it under a commercial license
38%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
by default (simply copy in the SSHD: line if your file doesn't exist). Listing 1 Permissions for Key tcpd Files -rw-r--r-- 1 root root 351 Nov 3 2012 /etc/hosts.deny -rw-r--r-- 1 root root 348

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice