Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 99 Next »

15%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
antivirus detections, I need to create a stand-alone binary with msfpayload . Msfpayload creates a binary that launches a simple reverse shell, allowing a remote user to connect to the victim’s machine
15%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
the remote screen. If booting the Live CD takes too long for your liking, you can transfer the Redo Backup image to a USB stick. The developers recommend Unetbootin [4] for this, but the Live CD also comes
15%
End-to-end monitoring – Measuring what the user perceives
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © complize, photocase.com
to track, record, and compare application performance at all locations, applications can be tested for access by Citrix users or remote desktop web access. If you visualize the measurements on a timescale
15%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
and remote sites with low bandwidth for local distribution. This technique removes the need to run a Windows Update distribution solution such as Windows Server Update Services (WSUS) at all locations. Storing
15%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
are great early adopters that take advantage of NVMeOF on Remote Direct Memory Access over Converged Ethernet (RoCE). VMware has introduced NVMeOF capabilities, but has not yet publicly announced when support
15%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
– usually using a TLS connection, which in turn requires X.509 certificates, which means a PKI is also required to manage the certificates. Certificates can also be used to authenticate the remote station
15%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
.ADMX and EMET.ADML from the installation directory into the PolicyDefinitions directory on a domain controller or a workstation with the Remote Server Administration Tools (RSAT) installed. Then, use the central
15%
Landscape
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
use scripts to perform remote queries via Landscape. To complete the configuration, the client sends a registration request to the specified Landscape account. In the web interface, you just click
15%
Live snapshots with Virtual Machine Manager
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Iryna Denysova, 123RF.com
. Conclusions Virtual Machine Manager is a useful helper for many system administrators; in particular, it is an obvious choice for managing remote hypervisors. However, the development rate is relatively
15%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
. The Network Service Manager daemon receives a request from the client pod looking for a connection to the VPN gateway over Google's remote procedure call (gRPC) framework [7]. The manager forwards the request

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice