Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (144)
  • Article (139)
  • News (31)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 Next »

9%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
rely on stolen login credentials. For example, if a user logs on to the file server from their laptop, a large volume of data is transferred. If the user then accesses other services
9%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
for Windows Assessment Console (WAC). When installed on a laptop, WAC offers tests mainly optimized for evaluating the system's battery life (Figure 3). To work around this problem, you can select the Run
9%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
and with Windows 2000, modern Windows versions can handle this problem. Nevertheless, during the pandemic, some organizations used group policy to disable machine password changes for home office laptops
9%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
Computing Environments) support or another terminal device (laptop, PC) will ideally be in place on the user side. The open source SPICE software and SPICE protocol of the same name act as the communication
9%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
. If the company's own service laptop breaks down, an employee is practically unable to work until they are issued replacement hardware that is allowed to talk to the VPN
9%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
solutions such as Rsync came into play. However, Rsync requires a functioning network connection between systems. A company laptop that has to be connected to the VPN to get an Internet connection does
9%
Overview of cloud platforms and appliances
15.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
overhead. On top of this, every application on an Azure Cloud operating system has its own IP address, a concept that has potential for terminal devices (hosts, laptops) on IPv6. On the other hand
9%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
stores the data there. That aside, the BadUSB function is easy to use. Starting at the Main Menu, choose Bad USB , select the payload script, connect the device to the laptop, and Run the script. Flipper
9%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
and resource management, what next? Should you install Blender [16] and start rendering a feature-length movie? Will you install MPI and explore parallel computing [17]? Maybe you can run the Linpack benchmark
9%
Warewulf Cluster Manager – Master and Compute Nodes
22.05.2012
Home »  HPC  »  Articles  » 
that combines the stateless OS along with important NFS-mounted file systems. In the third article, I will build out the development and run-time environments for MPI applications, and in the fourth article, I

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice