Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 149 Next »

13%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
the demand on the underlying network that is its lifeblood. A service mesh offers a straightforward way to implement a number of common and useful microservice patterns with no development effort, as well
13%
VDI Basics
03.09.2013
Home »  Articles  » 
 
for the required server hardware, plus storage and network costs, new devices, and the right application and operating system licenses (see the box “We Have Learned Much About Complexity”) can easily eat up
13%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Rgbspace, Fotolia.com
on the same hardware as the original. ReaR builds the rescue medium with all existing drivers, and the restored system adjusts automatically to the changed hardware. ReaR even detects changed network cards
13%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
Terminal devices increasingly reside outside the corporate network and can be reasonably trusted on there to access applications and resources – if they use VPNs, multiple-factor authentication (MFA
13%
Scale Your Docker Containers with Docker Swarm
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Author, 123RF.com
Docker Hub: docker pull nginx From this image, you can then create as many containers as you like. To deploy Nginx as a container on your network (exposing it on both internal and external port 80), run
13%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
Architecture Figure 1 shows the typical architecture of a SIEM system: It uses SIEM collectors to integrate a variety of data sources (e.g., servers, network components, management systems, firewalls, and IDSs
13%
Controlling virtual machines with VNC and Spice
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Oleg Doroshin, 123RF.com
only if you select the Spice protocol in the Display tab. VNC Desktop VNC stands for Virtual Network Computing and gives users the ability to display the screen content of another machine, including
13%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
simplified software distribution. Deploying, updating, and deleting software packages can all be automated. Moreover, you can distribute the packages in predefined time windows and as a function of the network
13%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
. For example, you can query the data of another system in the network with the command: msinfo32 "/computer " Hardware information includes details about the processor and motherboard
13%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
processes [1]-[5]. Jails thus offer a useful option for providing network services. However, a jail will not increase the security of a daemon itself. If an FTP daemon has a vulnerability, then it will still

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice