Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 99 Next »

29%
PC over IP
03.09.2013
Home »  Articles  » 
 
means that even heavy-duty workstations can operate remotely. ... of central resources and workplace ergonomics) favor the use of remote, instead of static, workstations. For these reasons, it makes sense to set up workstations at the data center, where they are under ... means that even heavy-duty workstations can operate remotely.
29%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
Tap into the power of MPI to run distributed Python code on your laptop at scale.
28%
Joint Supercomputer at Home in Iceland
10.05.2012
Home »  HPC  »  News  » 
 
in the Advania Thor Data Center in Iceland, a new environmentally friendly “green” data center. According to the announcement, the supercomputer is part of a pilot initiative to test remote hosting ... Joint project for new supercomputer to test remote hosting at the new environmentally friendly Advania Thor Data Center in Iceland.
28%
Apache Promotes Airavata to Top-Level Project
11.10.2012
Home »  HPC  »  News  » 
 
Apache Airavata helps manage long-running applications and workflows across local and remote resources.
27%
AMT Flaw in Intel Chips Allows Attacker to Create a Backdoor
16.01.2018
Home »  News  » 
 
F-Secure researchers have found a way to exploit the security flaw in AMT that allows a local attacker to backdoor almost any corporate laptop in a matter of seconds, even if the BIOS password, TPM
26%
Cryptographic key access in the cloud
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © scanrail, 123RF.com
PG, and crypto frameworks like OpenSSL, NSS, or GnuTLS. Agent Forwarding To begin, I'll take a look at SSH. If a user wants to log on to a remote computer by way of public key authentication, the user's public ... Cryptographic keys, usually available locally but not on remote computers, can be accessed for use in cloud environments.
26%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
perl Makefile.PL 04 make 05 make test 06 make install First Steps Commands are transmitted to the remote Rex client through a so-called Rex file. Listing 2 shows a fairly simple example. The first ... Rex doesn't need agents or a special language to describe the tasks it performs on remote computers.
25%
Jeep Cherokee Hacked Again
03.08.2016
Home »  News  » 
 
. Unlike their previous hack, which was executed remotely, the new hack requires physical access to the car. Miller and Valasek plugged in their laptops to the OBD (the diagnostic port of the car
25%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
Secure Shell (SSH) is more than a simple remote connectivity protocol. The SSH utility is one of the most versatile tools in your administrative toolbox. You can use SSH to copy files securely ... Add extra security to your SSH service, securely copy files to and from remote computers, and configure passwordless SSH for automation scripting.
25%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
The Remote Desktop Protocol (RDP) is still one of the most important methods for remote access. In this article, I show you how to enable RDP and use it in an effective and secure way. As an admin ... Know when to make RDP available on the Internet for remote access to Windows Server and how to configure connections securely when you do.

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice