Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (158)
  • Article (6)
  • News (4)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 17 Next »

27%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
from the ability to manage other systems remotely with cmdlets. PowerShell bestows great power on Windows Administrators – power that, used wisely, will save time, effort, and frustration in environments
27%
Routers Remain Top Target for IoT Attacks, Per Zscaler Report
10.11.2025
Home »  News  » 
 
methods include command injection and directory traversal techniques, which “often exploit unauthenticated remote code execution (RCE) vulnerabilities, such as CVE-2016-10174 and CVE-2018-10561 that allow
27%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
locally with the kadmin.local tool or remotely with kadmin. This setup assumes that the KAdmin service is enabled on the KDC, and you also need a valid admin principal in the /var/kerberos/krb5kdc/kadm5.acl
27%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
, You've Got Battery Life If you're looking for a lightweight laptop, but netbooks are too low-powered and you're not ready to invest in a MacBook Air, you might be interested in Dell's ultra
27%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
.crt files on the OpenVPN server. On the client side (a laptop in this case) you only need the CA.crt and tls-auth.key files. The client.pem file belongs on the e-token. The lower part of the figure shows
26%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
is a native parallel computing model based on two primitives: remote references and remote calls. Julia uses message passing behind the scenes but does not require the user to control the environment explicitly
26%
Linux Kernel 6.17 is Available
30.09.2025
Home »  News  » 
 
If you're a gamer, you'll be thrilled with the latest Linux kernel, which now supports the Core Ultra Series 3 laptops. As well, machines spec’d with a Core Ultra Series 2 CPU, the Intel IPU7 driver
26%
Windows client management with the new Opsi 4.0.1
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
if the connection were interrupted. Apart from this, a traveling worker's laptop would be unable to reach its Opsi server for lack of a network connection. In other words, a totally different solution was needed
26%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
@antiphishing.org . You can download and read the complete report at: http://www.apwg.org/index.html. Dell to Deliver Ubuntu Laptop Dell has announced
26%
SUSE Linux Enterprise Server 16 Now Available
14.11.2025
Home »  News  » 
 
Cockpit in place of YaST2 for remote management. Transitions from AppArmor to SELinux as the default Mandatory Access Control (MAC) framework. Includes Ansible to enable automation out of the box

« Previous 1 2 3 4 5 6 7 8 9 10 ... 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice