Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (143)
  • News (4)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 15 Next »

25%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
be rolled out at any time. UTM 9 enables secure remote application access without installing any software on the desktop. The HTML5 VPN portal lets users connect to internal resources regardless of location
25%
Link aggregation boosts securityand increases throughput
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© zentilia, 123RF.com
if the remote site is an active LACP (i.e., it prefers not to speak unless spoken to). Active LACP: The port prefers to transfer LACPDUs and thus to speak the protocol – regardless of whether the remote
25%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
'uptime'" -H "marvin zaphod"-u hans -p 123456 The -e parameter is followed by the command to be run in quotes. run 'uptime' tells rex to start the uptime program on the remote computer. The say to the left
25%
What's new in Small Business Server 2011
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
A&M Rovenko, 123RF
-party vendors have a product specially designed for SBS. Users can again access their local data on the SBS network via remote web access; Microsoft optimized the interface for this (Figure 3
25%
Advanced security in Windows Firewall
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Andrius Repsys, 123RF.com
choose to add a rule. The next dialog box allows you to select the source and target addresses, which are referred to as local and remote . Typically, only restrictions on remote addresses
25%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
of NAP are available for access protection, including: DHCP, VPN, IPSec, Terminal services (e.g., Remote Desktop Services), and IEEE 802.1X devices. This article relates to access via wired 802.1X devices
25%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
The Metasploit Framework [1] is a penetration testing toolkit, exploit-development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms
25%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
can be solved. On desktop systems, an applet also provides information on whether access was blocked by SELinux. Malware Protection We also have a family laptop in the living room; my wife and son
25%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
, I'll examine the response of my laptop to: watch cat /proc/loadavg 0.03 0.03 0.07 1/362 23038 This is what an idle system looks like. When examining load average numbers, you should also be aware
25%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
, but the cause is often much more trivial. For example, roaming users who do not always have a network connection for their laptops will obviously not always be able to communicate with a central directory service

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice