Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (707)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 101 Next »

15%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
for the attacker. The malware is apparently able to enter the system at a lesser security level and begin reconnaissance, performing tests and sending information back to a remote command and control center
15%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
on the previously configured Atomic instance and verify that it is also available there now: # ostree remote add f22-custom http://192.168.122.1:36073 --no-gpg-verify # ostree remote list -u f22-custom http://192
15%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
: Adding a PostgreSQL FDW as a database extension. You don't have to install an FDW on the remote database server, but you must ensure that the local database is granted access to the database you want
15%
News for Admins
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Gernot Krautberger, Fotolia
Hackers Threaten to Wipe More Than 300 Million Apple Devices Remotely A group of hackers that call themselves the "Turkish Crime Family" claim that they have access to more than 300 million
15%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
the locally focused SCSI block storage protocol and adds the ability to reference resources across the network. By issuing SCSI commands over the TCP/IP suite, iSCSI makes it possible to integrate a remote
15%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
be rolled out at any time. UTM 9 enables secure remote application access without installing any software on the desktop. The HTML5 VPN portal lets users connect to internal resources regardless of location
15%
Link aggregation boosts securityand increases throughput
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© zentilia, 123RF.com
if the remote site is an active LACP (i.e., it prefers not to speak unless spoken to). Active LACP: The port prefers to transfer LACPDUs and thus to speak the protocol – regardless of whether the remote
15%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
, energy, and  – on laptops – battery power, even though this is unnecessary in idle mode. The new kernel fixes this vulnerability by not listening for events at fixed times but only when they occur
15%
Elastic Beanstalk
29.10.2013
Home »  Articles  » 
 
done, this is what you should have seen:  ElasticBeanstalk git:(master) eb start Starting application "DanApp". Would you like to deploy the latest Git commit to your environment? [y/n]: y remote
15%
Rex
19.02.2013
Home »  Articles  » 
'uptime'" -H "marvin zaphod"-u hans -p 123456 The -e parameter is followed by the command to be run in quotes. run 'uptime' tells rex to start the uptime program on the remote computer. The say

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice