Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1259)
  • News (417)
  • Article (308)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 200 Next »

12%
FreeRADIUS for WiFi hotspots
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Tyler Olson, 123RF.com
. Figure 2: A RADIUS server provides user data to the WiFi hotspot. The resolution for the acronym RADIUS – Remote Authentication Dial-In User Service – shows that the system was designed for greater
12%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
. That said, no other system provides an equivalent level of safety. In this article, I introduce the main components of a PKI and show practical implementation options using examples such as email encryption
12%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
been on board since SQL Server 2014. Microsoft places great emphasis on providing databases quickly and efficiently for analysis. This includes in-memory data processing. In this process, SQL Server
12%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
the Windows environment, the open source community, and commercial programs that provide useful and practical support for controlling and managing hardware under Windows. Windows Offerings Both the older
12%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
configurations in the system's own key-value store (typically etcd) and provide a REST API. They use these configurations to field instructions from the Kubernetes framework. To use the add-on features, you need
12%
Cost management for cloud services
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Elijah Mears on Unsplash
to Red Hat's OpenShift platform. The Koku UI in particular depends on Red Hat Insights, making it difficult to deploy in other environments. Unfortunately, the developers do not provide any hints on how
12%
Controlling Amazon Cloud with Boto
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Claudiarndt, photocase.com
Amazon for free [1], is better suited for more complex setups. If you want to write your own scripts to control your own cloud infrastructure, however, Boto provides an alternative in the form
12%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
health, such as detecting infections and security breaches across the board. A laptop that sends a query to a domain name that is clearly used by a certain type of malware is almost certainly infected
12%
What's New in NetworkManager
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Anukrati Omar on Unsplash
for some time, many administrators still appreciate the flexibility that NetworkManager offers. The tool is especially convenient when you use a laptop and switch between different wireless local
12%
All you ever wanted to know about hard drives but never dared ask
16.05.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
of the 4ms a 7,200rpm unit delivers – to 2ms. My laptop's older SSD comparatively delivers a 0.2ms average access time. More significant facets of enterprise disks lie in their different firmware behavior

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice