Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 160 Next »

38%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
, object access is designed to make RHSS a full-fledged alternative to Amazon’s S3 or Google Drive by letting users upload files via a web interface. Again, Red Hat sticks to its GlusterFS guns and relies
38%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
bootstrapping of its own local cloud, which does not require access to a public cloud provider and thus imposes very few requirements. The Cloudify tarball is a heavyweight at 160MB, but the user initially only
38%
Green IT
24.10.2011
Home »  Articles  » 
 
Does it make sense to replace your computers every three years once the warranty has expired? This practice would keep you up to date at all
38%
Email sender verification with DMARC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © tigger11th, Fotolia.com
of cooperation between Google, Yahoo, and other major corporations, seeks to reduce spam and tackle the problem of sender verification at the root. Based on SPF and DKIM DMARC checks the domain used
38%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
does not provide its own apps for mobile devices, but integration into the mobile K-9 client [7] works without problem. Using the CardDAV and CalDAV protocols, you can synchronize your addresses
38%
OpenFlow-capable Zodiac WX access point
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Florian Biedermann on Unsplash
if several access points are used. Instead, the SDN controller can use an existing API to customize anything that OpenFlow does not cover. Incidentally, if the admin does not enable the SDN controller
38%
Back up virtual machines and clusters
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © ximagination, fotolia.com
365 and Google G Suite. The limit is 10 user accounts and their data. Backups of conventional Windows servers are also possible, as well as up to 10 workstations. You can also include Mac computers
38%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
from Gmail, Yahoo, and Outlook.com at the push of a button. For other providers, you enter the access data manually in a separate dialog. Geary only integrates IMAP accounts and does not support POP3
38%
App Proxy support for Remote Desktop Services
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Iwona Castiello d'Antonio on Unsplash
as "healthy." The architecture makes deployments simple. The proxy does its work with outbound network connections to the cloud only – central IT does not need to drill down into firewalls [1]. Many
38%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
(Figure 2). If you take a look at the Process Metadata for jh in Figure 1, you'll see that it has an MRI Score of 61, as does svchost.exe (Figure 2, second column

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice