Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 75 Next »

15%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
. This solution works fairly reliably, although problems can occur with multiple-level NAT. The WLAN router translates the addresses in communications with the ADSL modem, which also uses NAT. This often leads
15%
Service management by the book
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Michael Flippo, Fotolia.com
information that could lead to changes and improvements to your overall service strategy (thus completing the cycle). All That Glitters Is Not Gold Although ITSM is a lot more than what I have discussed here
15%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
words, both variants – purchasing and upgrading – should alternate to achieve an ecological optimum. Other considerations lead to the conclusion that upgrading after three years is not the most ecological
15%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
and the applications thus are the blood in the veins of the company's IT infrastructure. A server failure will inevitably lead to loss of productivity. Depending on the industry, the consequences of a server failure can
15%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
updates, the time involved in the process and the possibility of a critical patch slipping through the cracks lead to the need for a tool that tabulates, manages, schedules, and implements patches. Red Hat
15%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
and will always load the latest version of a Gem, instead of a specific version, and this can lead to compatibility issues. A useful approach in this case is to maintain Gems in a project-specific way instead
15%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
document [5] mandatorily calls for RA filter mechanisms on Layer 2 switches. Initial experience shows that even leading manufacturers are unfortunately only implementing this feature in the latest hardware
15%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
. Jitter occurs when packet transit times vary (e.g., because of network congestion, different routes, or hardware delays). These fluctuations lead to audible disturbances such as dropouts or distorted audio
15%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
their activities throughout an enterprise, leading to a temporary halt in production and reformatting of all networked assets. The key takeaway is not about a specific exploit, but rather the issues
15%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
, which also leads to incomplete results. Without the necessary authorizations, a network scan for DCs will not detect any relevant vulnerabilities. Ideally, you will want to run Nessus with a domain

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice