Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (143)
  • News (4)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next »

25%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
App [3] to control its filers remotely. The backup software can use this API to mount the storage and show its directories in your browser (Figure 2). In the course of a backup, a snapshot is first created
25%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
, that has a remote "wipe" capability built into it, that includes Active Directory or LDAP support, and that intrudes as little as possible into the functionality of the devices themselves. After all, you don
25%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
. After you choose a move option, the wizard connects the remote server using the remote file browser, and you can select the local directory to which you are moving the Hyper-V virtual hard disks
25%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
packets received, 0% packet loss round-trip (ms) min/avg/max/stddev = 0.215/0.307/0.415/0.090 Another representative of operating system-specific syntax is the remote shell. This program goes
25%
Updating Small Business Server 2008
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Petra Wanzki, Fotolia
Vista and Windows 7; remote management of Windows Vista/7 computers will not work. This client security issue can be fixed with a group policy. To do so, open the group policy management tool on the SBS
25%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
are storing their email or whether they are covered by a backup plan. Users tend to manage offline archives locally on laptops and PCs that are not covered by the backup policy. If the laptop is lost or damaged
25%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
equipment, as detailed in Table 1. In the case of the sole proprietorship, they assumed a desktop PC and a laptop. Table 1 Equipment per Size Class   Large Corp. Mid
25%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
the intruder's visits. Additionally, security considerations should not be restricted to the immediate workplace. Important documents and laptops may not be on the company's premises but somewhere in a hotel
25%
Hardware or Cloudware?
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
laptop, and open it up again later check on things. When the run is done, PBS Desktop will automatically copy all the files back for you. AM: What would you tell people if they are thinking about getting
25%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
in the Ubuntu 11.x and Debian 6.x package sources. You can also opt for the host-based IDS OSSEC by Trend Micro [3]. If the Prelude Manager is running on a remote server, the rule-based Prelude Correlator

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice