Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Next »

7%
Windows 10 Updates with WSUS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © sensay, 123RF.com
, especially on slower Internet connections. If you want to set up more than one computer, it can take hours for the servers or workstations to update. In these cases, it makes sense to use an update CD
7%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
. The news gets better: Experience reports indicate that the use of NxFilter has a positive effect on the Internet connection of all the network clients. The reason for the performance gain is the local cache
7%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
cases, because the data structures differ greatly. Infos MariaDB replication: https://mariadb.com/kb/en/standard-replication/ PostgreSQL streaming replication: https
7%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
for the application. In most cases, the images are based on a specific Linux distribution and contain not only the run-time environment for the application itself, but also a lot of the dependencies, which means
7%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
to recover the encrypted files. Once the encryption process is complete, Locky stores a ransom demand and also sets up a desktop background with a ransom demand. It requires the victim to pay a ransom of 0
7%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
. A physical SIM first has to be handed over to the employee, either in person or by surface mail. Once received, it has to be broken out of the packaging and inserted into the device. With the eSIM, these two
7%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
of MFT, but each must be optimized for the application in question. Infos "Data Protection Laws, an Ocean Apart" by Natasha Singer, The New York Times , February 2, 2013, http://www.nytimes.com
7%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
://oxpedia.org Scalix: http://www.scalix.com Scalix 12.5: http://www.scalix.com/main/37-english/support/400-scalix-12-5-release-notes Tine 2.0: https://www.tine20.org Zarafa: http://www.zarafa.com Zarafa
7%
Privileged Identity Management in Azure AD
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © lassedesignen, 123RF.com
into the wrong hands or from accidental misadministration. Of primary importance is the use of separate accounts – accounts that are not used in daily work, such as email, phone calls, or internet searches
7%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
for more than 30 new protocols including JSON, Wi-Fi P2P (Wi-Fi Direct), and Fibre Channel over InfiniBand. Also, Wireshark 1.6.0 can export SSL keys and SMB objects. Another new feature in Wireshark 1

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice