Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 101 Next »

15%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
, that has a remote "wipe" capability built into it, that includes Active Directory or LDAP support, and that intrudes as little as possible into the functionality of the devices themselves. After all, you don
15%
Welcome
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © archman, 123RF.com
(SIEM), and mobile device management (MDM); you use network address translation (NAT), require a virtual private network (VPN) for remote connectivity, keep all your systems updated, keep an application
15%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
none at all). The accumulation of these minor deviations creates a quiet chaos, unnoticed by senior management until it becomes critical. The worst-case scenario occurs when a remote attacker
15%
Modern network diagnostics
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Paul Aniszewski, 123RF.com
quick, actionable insights into network connectivity, port availability, and route tracing. Test-NetConnection is designed to test whether a remote host or service is reachable from the local machine
15%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
model based on two primitives: remote references and remote calls. Julia uses message passing behind the scenes but does not require the user to control the environment explicitly like MPI. Communication
15%
News for Admins
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
, such as resource group scoping for Azure PowerShell cmdlets when within the context of a resource group path in the Azure drive. It also enables interactions with virtual machines (VMs) using PowerShell remoting
15%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
the remote desktop protocol (RDP), server message block (SMB) protocol, or any type of remote authentication that Windows uses, which already offers a modicum of protection. Whenever the CrowdSec service
15%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
remote commands from WSL with PowerShell or use PowerShell over SSH to access Windows-specific cmdlets, allowing them to bypass PowerShell script logging
15%
News for Admins
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
 
. Respondents ranked the following factors as important in terms of employer brand: Culture (85%) Corporate reputation (66%) Product and purpose (62%) The ability to work remotely is also
15%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
allows us to identify all processes with connections to remote hosts. Figure 1: Processes with open sockets or network connections to remote hosts

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice