Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 149 Next »

13%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
processes or active network connections. Tapping into RAM is especially important for countering anti-forensics techniques. In some cases, it is possible to extract the passphrase for an encrypted drive from
13%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
. Managing Linux servers on the network is also no problem, and even if Windows Server is installed on all systems, Windows and Linux containers can still be used in parallel. Linux Bash can also be used
13%
Modern implementation of DHCP with Kea
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Cheryl Ann Quigley, Fotolia.com
to the Internet Systems Consortium's open source DHCP server (ISC DHCP), which has been widely used on enterprise networks since 1999. Version 1.8.1 [1] of the DHCP server was recently released and is available
13%
Samba 4 appliances by SerNet and Univention
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Ricky Grant, 123RF.com
BIOS computer name is restricted to a maximum length of 15 characters. NetBIOS is a network protocol used on Windows systems for name resolution and network communication and is mapped in Samba 3 by the nmbd
13%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
primarily on generating infrastructure components – that is, individual or whole clusters of VMs and associated networks and firewalls but also components such as virtualized load balancers and routers
13%
An overview of VMware tools
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Giuseppe Ramos, 123RF.com
CPUs), amount of virtual memory (vRAM), speed of the network connection (bandwidth), and contract duration. Thus, the vCloud Hybrid Service Dedicated Cloud provides physically isolated and reserved computing
13%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
are connected to the corporate or university network by a virtual private network (VPN). VPNs allow you to connect to networks from virtually anywhere in the world if you have access to the Internet. (I
13%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
traditional rate-limiting approach, courtesy of advanced Linux networking and traffic control (tc), is investigated with the kernel's built-in Netfilter packet filter controlled by its iptables frontend
13%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
this option because they have little chance of losing data if the NFS server goes down or network connectivity is lost. Asynchronous mode allows the server to reply to the NFS client as soon as it has
13%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
employees gives the topic a whole new dimension. A secure VPN access to the company's file server is possible in principle but not very practical on mobile devices. The current protocols and network

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice