Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 99 Next »

15%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
of NAP are available for access protection, including: DHCP, VPN, IPSec, Terminal services (e.g., Remote Desktop Services), and IEEE 802.1X devices. This article relates to access via wired 802.1X devices
15%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
The Metasploit Framework [1] is a penetration testing toolkit, exploit-development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms
15%
Law of Averages – Load Averaging
01.02.2013
Home »  Articles  » 
 
. Pragmatically, I’ll examine the response of my laptop to:   watch cat /proc/loadavg 0.03 0.03 0.07 1/362 23038   This is what an idle system looks like. When examining load average numbers, you should also
15%
Totally Stressed
30.09.2013
Home »  Articles  » 
 
are not sure what board you have installed, or you use a laptop with a motherboard designed specifically for mobile use, simply press the OK button to enable the first list entry, Run_sensors-detect . Your
15%
Environment Modules Using Lmod
08.08.2018
Home »  HPC  »  Articles  » 
use Lmod on my desktop and laptop to try new compilers or new versions of compilers, as well as new versions of libraries. Fundamentals of Environment Modules Programmers use a number of compilers
15%
Environment Modules Using Lmod
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Federico Caputo, 123RF.com
development and has some unique features that can be very useful even on your desktop if you write code and want to use a variety of tools and libraries. I use Lmod on my desktop and laptop to try new compilers
15%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
for improving the efficiency of CPUs with hardware multithreading. The exploit affects two of the most popular Intel platforms, Kaby Lake and Skylake, which power most modern PCs, including laptops, desktops
15%
News for Admins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
 
) spec for laptops, early work for ARM64 Hyper-V guests, RISC-V enhancements, support for Lenovo's ThinkPad X1 Tablet Thin Keyboard, support added for Apple's Magic Mouse 2, new drivers for Amazon's Luna
15%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
health, such as detecting infections and security breaches across the board. A laptop that sends a query to a domain name that is clearly used by a certain type of malware is almost certainly infected
15%
What's New in NetworkManager
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Anukrati Omar on Unsplash
for some time, many administrators still appreciate the flexibility that NetworkManager offers. The tool is especially convenient when you use a laptop and switch between different wireless local

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice