Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (162)
  • Article (7)
  • News (6)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 18 Next »

28%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) Proprietary product (RealTime) or features bare-metal recovery with separate license Bandwidth controls/Throttling Yes Yes, two methods Yes For laptop backups with TSM Fast
28%
Cloudflare Introduces Tools for Agentic AI Development
11.04.2025
Home »  News  » 
 
Cloudflare has announced new tools and features to accelerate the development of AI agents. These tools let developers “easily build and deploy powerful AI agents with the industry’s first remote
28%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
, a tablet computer, a laptop (notebook, ultrabook, netbook), the PC Monitor application, or a web page. As long as you have access to any type of computer or smartphone, you can stay in touch with what
28%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
by the install script; as a result, they access their DNF repositories over the Internet. Figure 2: IBM hosted (remote) Internet DNF repository. For an AIX
27%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
from the ability to manage other systems remotely with cmdlets. PowerShell bestows great power on Windows Administrators – power that, used wisely, will save time, effort, and frustration in environments
27%
Routers Remain Top Target for IoT Attacks, Per Zscaler Report
10.11.2025
Home »  News  » 
 
methods include command injection and directory traversal techniques, which “often exploit unauthenticated remote code execution (RCE) vulnerabilities, such as CVE-2016-10174 and CVE-2018-10561 that allow
27%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
locally with the kadmin.local tool or remotely with kadmin. This setup assumes that the KAdmin service is enabled on the KDC, and you also need a valid admin principal in the /var/kerberos/krb5kdc/kadm5.acl
27%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
, You've Got Battery Life If you're looking for a lightweight laptop, but netbooks are too low-powered and you're not ready to invest in a MacBook Air, you might be interested in Dell's ultra
27%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
.crt files on the OpenVPN server. On the client side (a laptop in this case) you only need the CA.crt and tls-auth.key files. The client.pem file belongs on the e-token. The lower part of the figure shows
26%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
is a native parallel computing model based on two primitives: remote references and remote calls. Julia uses message passing behind the scenes but does not require the user to control the environment explicitly

« Previous 1 2 3 4 5 6 7 8 9 10 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice