Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: hooker俱乐部客服联系dv9500.comhhpoker俱乐部客服联系dv9500.comhhpoker俱乐部客服联系dv9500.comhhpoker俱乐部客服联系dv9500.comp ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (51)
  • Article (18)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7

57%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
). These systems run on Fedora; however, the setup would work with any other operating system that the KVM hypervisor supports [4]. In testing, I decided to do without installing more virtual machines to avoid
57%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
You Need" box). The current version, the Raspberry Pi Model B+ [4] (Figure 1), continues a history of iterative improvements. What You Need Keep in mind that once you have a Rasp Pi B+, you
57%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
tokens globally, suggesting, that the algorithm and the seeds used to calculate the one-time passwords were stolen. SafeNet [4] is an American manufacturer of security solutions that acquired Aladdin
56%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
and organizations on which they work. Two of the more popular models include: The Cyber Kill Chain copyrighted by Lockheed Martin [4]. The Mitre ATT&CK model [5]. Just as a good hiker uses different
56%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
to earlier articles in this magazine [2]–[4].) Many users still think that VMs in the cloud are always publicly available. However, administrators who have been involved with virtual network infrastructures
56%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
://www.github.com/hbons/SparkleShare – Current version (as of October 2014) 7.0.2 (Community) 1.0.25 1.1 5.20141013   2.2 5.2.3 3.1.7 1.4 7.0 Release date August
56%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
into this vortex. Although Exchange is still available on-premises, Microsoft is increasingly focusing on cloud products [4]. European companies cannot transfer their data to a third-party cloud, even more so
56%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
0 127.0.0.1:12319 0.0.0.0:* LISTEN 766/shellinaboxd tcp 0 0 0.0.0.0:12320 0.0.0.0:* LISTEN 764/stunnel4 tcp 0 0 0
56%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
shares, including vWorkspace [3] and Pano Logic [4]. What VDI Means When you consider all the benefits, you might expect virtual desktops to be used in environments at least a few dozen clients
55%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
and various interfaces in such a way that this SSO feature works with a variety of SaaS offerings. Currently there are more than 2,500 software offerings, so chances are high that the desired software supports

« Previous 1 2 3 4 5 6 7

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice