Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 149 Next »

14%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
Imagine that you are working in your home office with your tablet, which is connected to your home’s wireless network. You leave the house for the airport, and while you’re traveling in a taxi
14%
Get to know Azure Files and Azure File Sync
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © moovstock, 123RF.com
Files is Microsoft's way of implementing serverless, fully managed file shares in the cloud to integrate clients on Windows, macOS, and Linux over the Server Message Block (SMB) or Network File System
14%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
in a single Linux distribution.   BackTrack Linux is a fine example of a specialized Linux distribution. Its only purpose is to test your network, devices, and systems for security vulnerabilities. Back
14%
Routing with Quagga
19.02.2013
Home »  Articles  » 
Complex, redundant networks, such as the Internet, require different routing policies from those typically found on a LAN. Ideally, the routers will know all the paths that lead to the target
14%
Running OpenStack in a data center
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © lassedesignen - Fotolia.com
Infrastructure The same basic rules apply to OpenStack environments as for any conventional setup: Redundant power and a redundant network are mandatory. When it comes to network hardware in particular, you
14%
Accessibility wherever you are with Mobile IPv6
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Fotograf, 123RF.com
Imagine that you are working in your home office with your tablet, which is connected to your home's wireless network. You leave the house for the airport, and while you're traveling in a taxi
14%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
security agencies have warned that Chinese state hackers (https://www.bleepingcomputer.com/news/security/white-house-salt-typhoon-hacked-telcos-in-dozens-of-countries/) "have compromised networks of major
14%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
and launched projects to match. The steps from the basic model to a concrete implementation are painstaking, partly because the model was initially very network-centric (zero trust networks) and primarily
14%
Devilish DNS Attack Compromises 300,000 SoHo Routers
04.03.2014
Home »  News  » 
 
passwords and banking information or push rootkit-style intrusion tools onto the victim's network. According to the report, most of the victims discovered so far are in Asia and Europe, however
14%
Penguin Puts MATLAB in the Cloud
07.05.2014
Home »  HPC  »  News  » 
 
offers cloud storage, and their website includes tutorials for getting their tools to work in the Amazon EC2 cloud. A ready-made solution in Penguin’s POD service network will help to extend the powerful

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice