Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 99 Next »

46%
Open source remote access to Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Nikolay Okhitin, Fotolia
A large university was recently in a bind. They needed to become PCI compliant, which meant securing remote access to their Windows servers with two-factor authentication. Most Windows-based remote ... FreeNX and the WiKID Strong Authentication System combine to create open source remote access that delivers the speed of NX with the security of SSH tunnels and Linux. ... Open source remote access to Windows
46%
Remotely managing web access servers
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Petre Coman, 123RF.com
Access to access the PowerShell of your servers remotely on a smartphone or tablet. Additionally, you can use all commandlets (cmdlets) that are available on the server. PowerShell Web Access requires you ... Remotely managing web access servers
45%
Windows Remote Assistance Vulnerability
27.03.2018
Home »  News  » 
 
Sharing is not caring, when it comes to sharing remote access to your computer. It could be helpful in certain use-cases, like troubleshooting but the access must be revoked as soon as possible ... Windows Remote Assistance Vulnerability
43%
phpVirtualBox and RemoteBox compared
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Renjith-Krishnan, 123RF.com
user interfaces implemented in PHP and Perl/Gtk give convenient access to VirtualBox's server features, helping a virtualization solution based on phpVirtualBox [1] or RemoteBox [2] fill the gap left ... Oracle's VirtualBox runs as an application on a host operating system, but the phpVirtualBox web interface and the native Perl/Gtk interface, RemoteBox, both make VirtualBox remotely manageable ... phpVirtualBox and RemoteBox ... phpVirtualBox and RemoteBox compared
42%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
their daily coding experience. The Remote-Tunnels extension [1] [2] is an example of powerfully expanding a developer's remote capabilities. This extension integrates with vscode.dev hosting Visual Studio ... Connect to remote machines with Visual Studio Code for the Web through secure tunnels – no SSH needed. ... Secure remote connectivity with VS Code for the Web
42%
App Proxy support for Remote Desktop Services
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Iwona Castiello d'Antonio on Unsplash
: By publishing a session on a VM or session host, entire applications can be published, provided the solution makes the session accessible by a gateway or proxy over HTTPS. If you can publish the Citrix or remote ... Support flexible working environments with Remote Desktop Services and Azure AD Application Proxy. ... App Proxy support for Remote Desktop Services
41%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
at the command line both on local and remote machines. In doing so, it takes care of SSH certificates autonomously, can use a proxy server to contact remote machines, and can wake up sleeping machines via Wake ... Managing SSH and other remote connections with PAC
40%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
entirely, if needed, retrofitting a wholly new system in place when an upgrade warrants it. Upgrading a laptop sets a higher bar and has become essentially impossible in the current era of ultrabook ... We show you how to build a compact, single-task device – if you dare to crack open an old laptop.
40%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
is disabling root logins and letting as few users as possible log in remotely over SSH, which is imperative to securing your SSH installation. A word of warning though: Make sure you have access to whichever ... The scope and functionality of SSH and sFTP provides both secure remote access and secure file transfers.
37%
New Vulnerabilities Found in Windows Remote Desktop Services
14.08.2019
Home »  News  » 
 
Researchers at Microsoft's security team has found four new critical remote code execution vulnerabilities in Windows. The vulnerabilities are in the Remote Desktop Services of Windows ... New Vulnerabilities Found in Windows Remote Desktop Services

« Previous 1 2 3 4 5 6 7 8 9 10 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice