Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 83 Next »

7%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
://en.wikipedia.org/wiki/Principle_of_least_privilege Docker user guide: http://docs.oracle.com/cd/E52668_01/E75728/html/section_rdz_hmw_2q.html Jenkins: https://jenkins.io Privilege separation: https
7%
Server virtualization with VirtualBox
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Federico Caputo, 123RF.com
ensure that Apache is only accessible from localhost, not the Internet. To do so, in /etc/apache2/ports.conf, just change the entry NameVirtualHost *:80 Listen 80 to: NameVirtualHost *:80 Listen 127.0.0
7%
Proxmox virtualization manager
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image by Daniela Cuevas on Unsplash.com
de facto standard for distributed storage in Proxmox VE 5.0. Plans for the near future include integration of the advantages of the upcoming Ceph LTS version 12.2, aka Luminous: The "Blue Store" back ... Proxmox has been working for years on their virtualization manager that does not require a cloud. We look at the improved reliability and new features in version 5.0. ... Proxmox 5.0
7%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
when interacting with the AI, this is equivalent to transferring the data to the Internet and releasing the data to the AI, which then learns by processing the information. In a worst case scenario
7%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
MTR can help you establish which router hop is causing packet loss (e.g., hop 2, in this case). Of course, the problem could be at either end of the connection – in the sending browser's upload
7%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
.1, -0.2, 0.91, 0.7, -0.21, 0.1 -0.7, 0.4] This numerical expression contains the coordinates of the words in a multidimensional space. When a sentence, an image, or a video is converted into a vector
7%
An Active Directory management solution for everyone
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
2 – without any problems in all cases. After installation, all employees can work with ADManager in the browser. Here, too, we did not encounter any problems in the course of our tests, regardless
7%
QUMBU backup and maintenance tool for Microsoft SQL Server
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Alexander Tkach, 123RF.com
  * Graphics resolution: At least 1024x768   * Microsoft SQL Server from version 2008 R2 on Windows   * Internet access for licensing the program For this example
7%
Network monitoring for Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© spectral, 123RF.com
Instrumentation (WMI), the Simple Network Management Protocol (SNMP), and, in the case of a compatible router (e.g., Cisco), NetFlow or sFlow. In the current version, you don't need to license NetFlow sensors
7%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
-specific configuration with WPA Enterprise. In most cases, the user database is not managed by the hotspot itself. Instead, the hotspot queries a RADIUS server on the same network (Figure 2): The central user

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice