Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 149 Next »

14%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
a virtual private network (VPN). RDP files can be digitally signed and protected with certificates, which enhances security while avoiding error messages popping up because of incorrect signing. All
14%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © crazymedia, 123RF.com
in the selected resource group and on the selected virtual network. To do this, the account requires the Virtual Machine Contributor and Site Recovery Contributor roles to manage the recovery processes. You should
14%
Using a Tablet as a Portable Management Console
14.11.2011
Home »  Articles  » 
 
selecting a tablet, check out available system administrator-oriented client applications such as VPN, SSH, RDP, VNC, VMware View, Citrix Receiver, DaaS, Database tools, and network testing tools
14%
Troubleshooting Kubernetes and Docker with a SuperContainer
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Sergey Nivens, 123RF.com
, query the process table, and use the network stack of a neighboring container without tainting the target container. Hopefully you agree that sounds intriguing and highly useful. A SuperContainer can
14%
Operating system virtualization with OpenVZ
28.06.2011
Home »  CloudAge  »  Articles  » 
 
is the network address of the VE into which you want to migrate to the VE with the ID of VEID. Of course, the vzmigrate tool supports a plethora of different options (e.g., for migrating over secure connections
14%
Run applications in a containerized sandbox with Firejail
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Victor Zastolskiy, 123RF.com
. In the network namespace, the available network interfaces, IP addresses, routes, and firewall rules can be abstracted in the same way as Unix domain sockets, and you can use the UTS (Unix timesharing) namespace
14%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
, ransomware often does not become active directly. Instead, it first looks at common IT processes, existing network drives, and temporarily mounted backup media. At the right moment – preferably when
14%
A REST API automation strategy for DevOps
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image by Alex Kotliarskyi on Unsplash
of IT automation: In typical companies, you can find automation silos in the classic infrastructure and application management areas, which means that host, storage, network infrastructure, firewall, compliance
14%
Exploring the most famous performance tool
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Lucy Baldwin, 123RF.com
fame, stolen CPU is not as significant for workloads that are not sensitive to network jitter or that are not real-time in nature. The Noisy Neighbor is a related term of art: In any virtual
14%
Encrypting DNS traffic on Linux with DoT
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Alexander Grey on Unsplash
means DNS traffic uses the same network port (tcp/443) as HTTPS. As a result, administrators initially have no way of distinguishing between DNS and HTTPS traffic. The standard is now supported by most

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice