Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (322)
  • Article (122)
  • News (43)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 49 Next »

39%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
code is written and compiled in one of three classic HPC languages: Fortran [2], C++ [3], or C [4]. Why these languages? Because they have enabled generation of very efficient code for a long time
39%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
such a hacker currently proceed in practice? In principle, an attack always follows the same phases: 1. Break-in 2. Persistence 3. Preparatory work (lateral movement) 4. Perseverance and system surveillance
39%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
as PaaS GigaSpaces, the company behind Cloudify, began developing the tool in 2012. Cloudify was originally designed as a tool for Platform-as-a-Service (PaaS) applications (although the boundaries to Saa
39%
Microsoft Network Policy Server
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Lexip, Fotolia.com
private network (VPN) servers, Microsoft NAP never really caught on and was discontinued with Windows Server 2012 R2. Since Windows Server 2016, the feature is no longer available. RADIUS Components
39%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
environments. Infos View my options and settings in the Trust Center: https://support.office.com/en-us/article/View-my-options-and-settings-in-the-Trust-Center-d672876e-20d3-4ad3-a178-343d044e05c8
39%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
Computer Congress (31C3) in 2014 on the basis of an error in the SSH network protocol from 2002 (CVE-2002-0083). There, a single bit decided whether an attacker could gain root privileges on the machine
39%
VPN clients for Android and iOS
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © fckncg, 123RF.com
or a manufacturer-specific device and those that support open protocols and remote sites. For the test, I set up the Microsoft VPN server in Windows Server 2012 R2 and an OpenVPN server in Ubuntu 14.04. I also
39%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
and performance levels [2]. According to Citrix, the software-based appliances, called NetScaler VPX, can handle data at 10Mbps to 3Gbps. They can be virtualized with VMware, Hyper-V (Figure 3), and Xen
39%
High-performance load balancing
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © meyrit, 123RF.com
, TLS termination, and so on. The advantage of using Layer 4 is very fast load balancing. Seesaw was originally developed by Google, which used two different load balancers in 2012 that proved
39%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
. All you need is a K3s or MicroShift single-node setup, a little patience, and many lines of YAML definitions. Although a manual installation will work, it does not lend itself to ease of use. Kube

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 49 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice