Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 148 Next »

13%
News for Admins
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
© Elnur Amiskishiyev, 123RF.com
, it moves in to infect other computers on the network. Trojan.Kwampirs creates a service to ensure persistence, so that the main payload is loaded into memory during system reboot. "When executed, Kwampirs
13%
Multifactor authentication with Google Authenticator
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © iofoto, Fotolia.com
configuration: auth required pam_unix.so or the corresponding include command: @include common-auth Anyone already working on a supposedly secure network might get tired of constantly looking at their mobile
13%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
Russian FindFace App is a Privacy Nightmare The machine-learning capability that social networks are gaining is becoming a privacy nightmare
13%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
on company networks can be attacked in many ways. You need to make a distinction between user access and privileged access. © Microsoft [2] In contrast to a local AD, restoring access to the Entra ID
13%
Back up virtual machines and clusters
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © ximagination, fotolia.com
on the Hyper-V host itself; instead, the connection and backup take place over the network. After the install, the functions of the Enterprise Edition can initially be used for 30 days, after which the software
13%
App Proxy support for Remote Desktop Services
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Iwona Castiello d'Antonio on Unsplash
as "healthy." The architecture makes deployments simple. The proxy does its work with outbound network connections to the cloud only – central IT does not need to drill down into firewalls [1]. Many
13%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Despite cloud and file servers on the corporate network, users still store important files on the local hard drives of their workstations or laptops. Modern solid-state drives (SSDs) lull users
13%
Installing applications in OpenStack with Murano
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © stylephotographs, 123RF.com
servers, networks, and storage quickly and elegantly. Although it is possible for cloud providers to earn money this way, for most others, the infrastructure is only the beginning. Applications need to run
13%
Microsoft PowerToys for Windows 10
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Kenney Badboy on Unsplash
clips. Installation and Set Up Installing PowerToys requires administrative rights, which naturally plays a role in installation and distribution on a network. The tools always appear as a complete
13%
Open source cloud technologies at a glance
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
alhovik, 123RF
Stack or the Citrix Cloud Platform, including GoDaddy, Nokia, Intel, Zynga, RightScale, PuppetLabs, Juniper Networks, Enstratus, TrendMicro, and Equinix. Brand name users such as ServiceMesh, Engine Yard, and Right

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice