Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 154 Next »

13%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
, Microsoft Remote Desktop Protocol (RDP), Apple Remote Desktop (ARD), and Virtual Network Computing (VNC) have all proven their value as protocols for accessing the graphical user interface (GUI) of remote
13%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
Routing Encapsulation (GRE) protocol tunnels and virtual private networks (VPNs). In 2018 Cloudflare introduced the Argo Tunnel as a solution to alleviate this problem. Individuals can create a secure
13%
Digital Forensics
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Image © armmypicca, 123RF Free Images
that includes databases, network devices, and mobile devices. It may also include other devices (e.g., supervisory control and data acquisition (SCADA) instruments) that store, process, or use data. Although
13%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
. A VM can be started by double-clicking the desired system. SPICE Open source SPICE is available free of charge. It allows a virtual desktop to be displayed over the network and ensures interaction
13%
Our Technological Enlightenment
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© lightwise, 123RF.com
, and computer networks were becoming commonplace in businesses. Still, we were in the dark and were disconnected. The mid-1990s saw a boom in the number of computer users with the new, publicly accessible
13%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
A penetration tester simulates an attack on a customer’s network by trying to find a way inside. Many such attacks begin using a scanning tool, such as NeXpose, Nessus, or Nmap, to look for network
13%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
is therefore the means of choice. Turbo II – NVMeOF NVMe over Fabrics (NVMeOF) is another new protocol for speedier server-to-memory connections. NVMeOF is an extension of the NVMe network protocol to Ethernet
13%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
to control the AWS Console. If you set up the virtual networks in the public cloud with private addresses only, they are just as invisible from the Internet as the servers in your own data center. Cloudbnb
13%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
and work their way up the network (Figure 1). Fortunately, administrators are not completely defenseless, because PowerShell 5 offers some useful security features that both limit the use of the scripting
13%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
ESXi server or a tethered network-attached server can serve as the backup target. Virtual machines (VMs) can also be scheduled for replication on a different host using XSIBackup. The software sends

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice