Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 154 Next »

13%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
on company networks can be attacked in many ways. You need to make a distinction between user access and privileged access. © Microsoft [2] In contrast to a local AD, restoring access to the Entra ID
13%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
in awareness training courses is the man-in-the-middle attack, in which attackers intercept data traffic on unsecured networks, such as public WiFi networks in hotels or cafés. Because almost all web
13%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
and extend the system's functionality." For example, the company states that the system provides easier integration with existing networks, visual server configuration and management, and other benefits
13%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
server. According to the announcement, Zentyal aims to provide small- and medium-sized businesses with "professional, reliable, and secure network infrastructure solutions that are both easy to use
13%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
for the virtual machine, copies the image file for the virtual disk, and gives the network adapter a new, random MAC address. The remaining hardware components remain unchanged. After cloning, however, much manual
13%
Back up virtual machines and clusters
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © ximagination, fotolia.com
on the Hyper-V host itself; instead, the connection and backup take place over the network. After the install, the functions of the Enterprise Edition can initially be used for 30 days, after which the software
13%
App Proxy support for Remote Desktop Services
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Iwona Castiello d'Antonio on Unsplash
as "healthy." The architecture makes deployments simple. The proxy does its work with outbound network connections to the cloud only – central IT does not need to drill down into firewalls [1]. Many
13%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Despite cloud and file servers on the corporate network, users still store important files on the local hard drives of their workstations or laptops. Modern solid-state drives (SSDs) lull users
13%
Installing applications in OpenStack with Murano
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © stylephotographs, 123RF.com
servers, networks, and storage quickly and elegantly. Although it is possible for cloud providers to earn money this way, for most others, the infrastructure is only the beginning. Applications need to run
13%
Microsoft PowerToys for Windows 10
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Kenney Badboy on Unsplash
clips. Installation and Set Up Installing PowerToys requires administrative rights, which naturally plays a role in installation and distribution on a network. The tools always appear as a complete

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice