Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (233)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 174 Next »

13%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
this option because they have little chance of losing data if the NFS server goes down or network connectivity is lost. Asynchronous mode allows the server to reply to the NFS client as soon as it has
13%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
employees gives the topic a whole new dimension. A secure VPN access to the company's file server is possible in principle but not very practical on mobile devices. The current protocols and network
13%
Active Directory overview
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Maksym Yemelyanov, 123RF.com
the ability to manage all network resources and user authentication centrally. To allow this to happen, all of the network resources – including users, groups, services, servers, workstations, shares
13%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
the demand on the underlying network that is its lifeblood. A service mesh offers a straightforward way to implement a number of common and useful microservice patterns with no development effort, as well
13%
VDI Basics
03.09.2013
Home »  Articles  » 
 
for the required server hardware, plus storage and network costs, new devices, and the right application and operating system licenses (see the box “We Have Learned Much About Complexity”) can easily eat up
13%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Rgbspace, Fotolia.com
on the same hardware as the original. ReaR builds the rescue medium with all existing drivers, and the restored system adjusts automatically to the changed hardware. ReaR even detects changed network cards
13%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
Terminal devices increasingly reside outside the corporate network and can be reasonably trusted on there to access applications and resources – if they use VPNs, multiple-factor authentication (MFA
13%
Scale Your Docker Containers with Docker Swarm
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Author, 123RF.com
Docker Hub: docker pull nginx From this image, you can then create as many containers as you like. To deploy Nginx as a container on your network (exposing it on both internal and external port 80), run
13%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
Architecture Figure 1 shows the typical architecture of a SIEM system: It uses SIEM collectors to integrate a variety of data sources (e.g., servers, network components, management systems, firewalls, and IDSs
13%
Controlling virtual machines with VNC and Spice
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Oleg Doroshin, 123RF.com
only if you select the Spice protocol in the Display tab. VNC Desktop VNC stands for Virtual Network Computing and gives users the ability to display the screen content of another machine, including

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice