Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (156)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 109 Next »

12%
Penetration Testing
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Snort IDS and monitoring Tor Browser Anonymity TrueCrypt Disk encryption Wireshark Sniffer
12%
Looking for System Admins …
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Piter Ivanov, 123RF
monitoring, clustering, and troubleshooting – for admins who manage Windows, Linux, Unix, and Solaris systems in heterogeneous environments. In these pages, you'll learn about some new features of the Windows
12%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
System and Hardware Monitoring htop System monitor (Figure 1) Android tools Various programs to manage and check data from smartphones and tablets inxi Discover
12%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
installed into /usr/local/anaconda3  by root . The startup definitions for Anaconda were in my .bashrc file, so it ran just fine before building legate.core . The laptop I used has the following
12%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
of ATA. The hdparm tool, which is included with almost all Linux distributions, at least lets you control the ATA security features by scripting or manual commands. On many laptops, ATA security
12%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
' lets two Bluetooth BR/EDR devices choose an entropy value for encryption keys while pairing to secure their connection." The vulnerability exposes billions of smartphones, laptops, and industrial
12%
Acceptable Risk
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Andrew Brown, 123RF.com
secret and to maintain a high level of personal security: locking their laptops, preventing over-the-shoulder spying, using a secure VPN connection, keeping anti-virus programs up-to-date, and leaving
12%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
chain security Figure 2 shows additional interdisciplinary functions. Of note are policy management and monitoring in the broadest sense (i.e., topics such as extended detection and response, XDR
12%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
therefore requires these attack surfaces to be monitored and evaluated 24/7. Similarly, analysts at Forrester Research in 2022 described ASM as "the process of continuously discovering, identifying
12%
Client management and configuration
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Wamsler, Fotolia
users or computers from a specific profile. Additionally, you can specify whether the assignment should apply to workstations, laptops, or servers or just to machines with specific versions of Windows

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 109 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice