Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (707)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 101 Next »

15%
Professional PowerShell environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © lightwise, 123RF.com
parameter, and the consumer is defined by -action. Security is built-in on the second level, script execution. WMI offers its own remote architecture with the Distributed Component Object Model (DCOM), which
15%
Platform independence with PowerShell Core
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image Photo by Harli Marten on Unsplash
/thomas/passwd.html The output of this command generates a tabular report. Remote Access, Old and New In PowerShell versions 2 to 5, remote access is implemented with the WS-Management Protocol. PowerShell endpoints
15%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
Services or the Linux ThinLinc remote desktop server also can be supported. A built-in browser is provided, of course, along with a VoIP client that transforms the thin client into a phone. IGEL Linux also
15%
Advanced security in Windows Firewall
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Andrius Repsys, 123RF.com
choose to add a rule. The next dialog box allows you to select the source and target addresses, which are referred to as local and remote . Typically, only restrictions on remote addresses
15%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
of NAP are available for access protection, including: DHCP, VPN, IPSec, Terminal services (e.g., Remote Desktop Services), and IEEE 802.1X devices. This article relates to access via wired 802.1X devices
15%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
The Metasploit Framework [1] is a penetration testing toolkit, exploit-development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms
15%
Law of Averages – Load Averaging
01.02.2013
Home »  Articles  » 
 
. Pragmatically, I’ll examine the response of my laptop to:   watch cat /proc/loadavg 0.03 0.03 0.07 1/362 23038   This is what an idle system looks like. When examining load average numbers, you should also
15%
Totally Stressed
30.09.2013
Home »  Articles  » 
 
are not sure what board you have installed, or you use a laptop with a motherboard designed specifically for mobile use, simply press the OK button to enable the first list entry, Run_sensors-detect . Your
15%
Environment Modules Using Lmod
08.08.2018
Home »  HPC  »  Articles  » 
use Lmod on my desktop and laptop to try new compilers or new versions of compilers, as well as new versions of libraries. Fundamentals of Environment Modules Programmers use a number of compilers
15%
Environment Modules Using Lmod
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Federico Caputo, 123RF.com
development and has some unique features that can be very useful even on your desktop if you write code and want to use a variety of tools and libraries. I use Lmod on my desktop and laptop to try new compilers

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice