Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (707)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 101 Next »

15%
Managing Virtual Infrastructures
21.01.2013
Home »  Articles  » 
 
Red Hat has now improved so that, for example, users can run any USB 1.1/2.0 device on a client, with Spice passing it through to the remote virtualized desktop operating system. Multi-Component Glue
15%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
Directory Server and use remote databases. All-in-one operation makes it possible to run the engine hypervisor on the same machine. VirtSandbox The VirtSandbox server tool makes it possible to embed secure
15%
John the Ripper
22.08.2011
Home »  Articles  » 
 
’s password and shadow files to a remote location. This procedure allows the hacker to crack the passwords at his leisure and in the safety of his own computer lab. Once the hacker collects a system’s password
15%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
Google+ Hangouts for meetings and training. For example, you and several colleagues located from remote offices could use Google+ to meet online. Unlike IRC or Skype meetings, attendees have the advantage
15%
Can Your Server Be Toppled with a Single Command?
01.10.2011
Home »  Articles  » 
 
a variety of traffic flooding attacks. You can, of course, apply these rate-limiting rules to any port number on your server, but proceed with caution and don't lockout remote access by accident if you
15%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
can load the popular HP system information GUI, which provides a plethora of useful information concerning the server. The SMTP Agent that installs at the same time lets you remotely monitor Xen
15%
Introduction to HDF5
22.02.2017
Home »  HPC  »  Articles  » 
a hyperspectral remote sensing data HDF5 file. Figure 1 shows a screenshot of the HDFViewer. Notice how the temperature data is under a hierarchy of directories. At the bottom of the viewer, when you click
15%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
Remora. REMORA: REsource MOnitoring for Remote Applications, from the University of Texas Advanced Computing Center (TACC), combines monitoring and profiling to provide information about your application
15%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
, the provider extended this shutdown to Exchange ActiveSync (EAS), POP, IMAP, and Remote PowerShell. Due to COVID-19, the deadline has now been postponed to the second half of 2021. In the future, logon
15%
Do You Know Juno?
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © alexskopje, 123RF.com
. In simple terms, the federation model works as follows: Keystone identifies a user by reference to login credentials and issues a matching token. With this token, the user turns to a different, remote

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice