Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 200 Next »

12%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
security updates using Windows Firewall with Advanced Security and using User Account Control (UAC). Additionally, EMET provides a configurable function for determining the trustworthiness of SSL
12%
We interview Red Hat CEO Jim Whitehurst
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Jim Whitehurst
versions of our own curated Linux in stores to an IT vendor providing subscriptions to businesses using our open hybrid cloud technologies. More than 90% of Fortune 500 companies rely on Red Hat technologies
12%
Integrating PowerShell with Ansible for hybrid automation
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Mulyadi on Unsplash
both Windows and Linux systems, which poses a significant challenge for system administrators. Enter PowerShell and Ansible – two formidable automation tools that, when combined, provide an elegant
12%
Attacks on telephone systems
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Christos Georghiou, 123RF.com
to perform calls to previously created premium numbers that are only available for a limited time. Some providers have proactive anomaly detection in place and can use this to determine an above-average number
12%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
options, including distributed and global disk storage, archival storage, and two classes of flash storage. The system provides both a high-bandwidth, low-latency, quad-data-rate InfiniBand network as well
12%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
as a root volume and then starts the actual init process. On current Linux systems, this is typically systemd. The init process can then use the drivers and programs provided by initramfs to gain access
12%
Pulumi multicloud orchestrator
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
get out of it? Infrastructure as Code Pulumi's central promise is infrastructure as code (IaC). Admins provide their virtual infrastructures in the form of code, and Pulumi makes sure that the virtual
12%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
this time span is drastically shortened, thanks to the cloud. The cloud provider must control the infrastructure in the data center to the extent that the platform can expand easily and quickly (i
12%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
machines running outside of Azure in a traditional data center or hosted by another cloud provider with Azure. Microsoft provides a diagram of all the Azure Arc components online [1], which also shows
12%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
books or conversion routines provided by the program, can be used with all accounts. Some programs offer prioritization of outgoing email and can send unimportant items with a time delay if you have

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice