Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (98)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

84%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
Phone configuration program to configure iPhones. Infos AppLocker policies: http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=13431 TechNet how-tos: http://technet.microsoft.com
83%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
/community/user/power/communities/community-home?CommunityKey=10c1d831-47ee-4d92-a138-b03f7896f7c9 AIX Toolbox for open source software: https://www.ibm.com/support/pages/node/882892 "Planning and Maintaining AIX Toolbox Packages" by Jan Harris, IBM Tech
83%
Remote desktop based on HTML5
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Phanlop Boonsongsomnukool, 123RF.com
/thinvnc/ noVNC: http://kanaka.github.com/noVNC/ Astaro UTM: ftp://ftp.astaro.com/UTM/v9/ Astaro login: https://my.astaro.com Digipass: http://www.vasco.com
83%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
.linuxvirtualserver.org/software/ipvs.html Piranha: http://www.redhat.com/software/rha/cluster/piranha/ The Author Khurram Shiraz is an Infrastructure Architect at GBM Kuwait and was earlier associated with IBM Pakistan. In his 10
83%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
? The first part of this workshop demonstrated how an additional node can be added to an existing cluster using ceph osd crush add 4 osd.4 1.0 pool=default host=daisy assuming that daisy is the hostname
83%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
: http://www.linux-kvm.org Qemu: http://www.qemu.org/ List of processors with Intel VT technology: http://ark.intel.com/VTList.aspx Qemu documentation: http
83%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
for NAP 802.1X: http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=733 The Author Eric Amberg is the CEO of ATRACON Gmb
83%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
: http://technet.microsoft.com/en-us/library/cc787034(v=WS.10).aspx
83%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
.0: http://www.redhat.com/promo/rhev3/ RHEV requirements: http://www.redhat.com/promo/rhev3/tryrhev.html oVirt: http://www.ovirt.org Release notes oVirt 3.1: http://wiki.ovirt.org/wiki/OVirt_3
83%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
be a pain for users, but they will be even more painful for hackers who want to steal data and wreak havoc on your systems. Don't make it easy for them. Infos Openwall: http://www.openwall.com/john

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice