Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (260)
  • Article (11)
  • News (6)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 28 Next »

20%
Living with Limits in the Post-PC Era
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
management (MDM). Once we've chosen a management suite, our battle is only half over. Most MDM suites provide consistent controls over devices that enter our network perimeters, both physically and virtually
20%
Tails 7.0 Announced
10.10.2025
Home »  News  » 
 
The Tails team has released version 7.0 of Tails, a portable Linux-based operating system that “uses the Tor network to protect your privacy online and help you avoid censorship.” This release
20%
Open Compute Project and SNIA Form Alliance to Tackle Data Storage Challenges
16.10.2025
Home »  News  » 
 
-neutral standards and technologies for data storage within open data center hardware ecosystems.” According to the organizations, the alliance is especially focused on data storage, memory, and networking challenges
20%
Ingress NGINX To Be Retired
22.11.2025
Home »  News  » 
 
The Kubernetes SIG Network and the Security Response Committee has announced the upcoming retirement of the Ingress NGINX Kubernetes controller. “Best-effort maintenance will continue until March
20%
System Tools for Recovering Broken PCs
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
, editors, and filesystem drivers. SystemRescueCd is an all-in-one toolbox you can use to diagnose network problems, check memory, restore system files, undelete partitions, and back up data from failing
20%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
-based attacks Flood the network with traffic to overload the bandwidth. Network bandwidth DDoS UDP/ICMP flooding Send a large number of UDP/ICMP packets to overload the target
20%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
they can then store on network attached storage. When needed, the server image can be loaded on replacement hardware (available on short notice by means of a hardware-independent restore [HIR] process
19%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
Admins prefer to discover vulnerabilities on their networks before attackers do, so it makes sense for those who look after these networks and AD to familiarize themselves with common tools
19%
Citrix Provisioning Services reviewed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© henrischmit, 123RF
a vDisk. vDisks can reside on a provisioning server, file server, or storage network (iSCSI, SAN, NAS, CIFS). Computers that receive and use the image are target devices in streaming services
19%
Windows client management with the new Opsi 4.0.1
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
if the connection were interrupted. Apart from this, a traveling worker's laptop would be unable to reach its Opsi server for lack of a network connection. In other words, a totally different solution was needed

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice