Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (232)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 174 Next »

19%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
SQL database from the cloud into their own network without having to worry about the server settings. Microsoft is responsible for maintaining, backing up, and updating the database server. If you opt ... Wherever Microsoft SQL Server runs on local networks, individual or all databases can be migrated to Azure SQL by transactional replication. Various opportunities unfold, including analytics
19%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
’Reilly Media founder Tim O’Reilly, Bradley Horowitz, Google Vice President of Product Management, explained the launch of the new social media network. In the interview, Horowitz says that Google+ use has been ... Google+ isn’t officially ready for corporate use, but users are already excited about what this new social networking platform means for the workplace. We look at how you can leverage Google
19%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
Cisco IOS NetFlow [1] collects IP traffic statistics at network interfaces, providing a valuable source of information to system administrators who want to gain in-depth insights into the activities ... network. We show you how to use Google Analytics to capture and analyze NetFlow data.
19%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
Networks Breached Citrix, a software giant that offers a wide range of products and services, admitted that its networks were breached (https://www.citrix.com/blogs/2019/03/08/citrix-investigating-unauthorized-access-to-internal-network ... F5 Acquires NGINX for $670 Million; No One Is Safe – Citrix Networks Breached; A 19-Year-Old Bug in WinRAR; An Image Can Compromise Your Android Device and LibreOffice Vulnerable to Remote Code
19%
Five free wiki platforms reviewed
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Mariia Zakatiura on Unsplash
used on local networks for documentation and internal document collections for code repositories, project management tools, and IT service management tools. The requirements for a wiki server are fairly ... for different use cases on the local network.
19%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
Whether you need more storage space for your users or for a server, setting up network attached storage (NAS) is a popular approach. NAS is cheaper than a storage area network (SAN ... Set up your own network attached storage system with minimum effort with the help of FreeNAS. Thanks to the ZFS filesystem, you have more flexible storage, which you can also provide via iSCSI.
19%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
During reconnaissance, intruders gather information from public sources to learn about the target: the nature of the business, the technical infrastructure, architecture, products, and network ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network's security. We'll show you some tools intruders use to gather
19%
Creating Active Directory reports using free tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © reddz, 123RF.com
create a logfile for all events related to group policies. If you save the file with the report on a network share, you can run the command via logon scripts. All computers on the network then store ... You don't have to spend a lot of money on expensive tools to read reports and analyze data on your Active Directory network. We show you some free utilities that will help you keep up with your
19%
John the Ripper
22.08.2011
Home »  Articles  » 
 
, to further complicate matters, is “Yes” and “No.” “Yes” because complex passwords prevent a hacker from guessing your password either across the network or locally on a system. Random password guesses result ... Easy to remember but difficult to guess isn’t just a catchy phrase for choosing passwords, it’s the law of the Net. Learn how to check your password using a tool network intruders use every day
19%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
, is "Yes" and "No." "Yes" because complex passwords prevent a hacker from guessing your password either across the network or locally on a system. Random password guesses result in account lockout after ... "Easy to remember but difficult to guess" isn't just a catchy phrase for choosing passwords, it's the law of the Net. Learn how to check your password using a tool network intruders use every day

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice