Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 99 Next »

23%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Measured values and status information can be collected and retrieved, messages received, and configurations changed remotely by SNMP, but if you want to do this for your own hardware or software
23%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
The k3s lightweight and secure Kubernetes distribution can handle both unattended workloads in remote locations with minimal resources and clusters of IoT appliances.
22%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
of central resources and workplace ergonomics) favor the use of remote, instead of static, workstations. For these reasons, it makes sense to set up workstations at the data center, where they are under ... means that even heavy-duty workstations can operate remotely.
22%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
PNG file to execute arbitrary code on unpatched Android devices. According to Google, "The most severe of these issues is a critical security vulnerability in Framework that could allow a remote ... F5 Acquires NGINX for $670 Million; No One Is Safe – Citrix Networks Breached; A 19-Year-Old Bug in WinRAR; An Image Can Compromise Your Android Device and LibreOffice Vulnerable to Remote Code
22%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
Like many of my colleagues, I use my own laptop to play back presentations at conferences. My Dell Latitude E6430 works perfectly on Ubuntu. However, one critical problem remains: when I connect ... If you use your Linux laptop for public presentations – or other tasks that require an external display – you are probably familiar with the problem of making your computer's display resolution fit
21%
Risky Business
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Oksana Stepanenko, 123RF.com
. Before having cloud applications to manage my passwords, infrastructure, backups, contacts, mobile applications, and creative application suite, I had to carry around a fully loaded laptop computer
21%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
, and there's a 5Mpx camera on the back. The Asus Transformer Prime TF201 tablet can convert between slate-only mode and laptop mode. Thus, users can take full advantage of the 10.1-inch, 1280x800 Super IPS
21%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
that affects Windows users. The remote code execution vulnerability affects several popular apps, including Skype, Slack, and Signal. "A remote code execution vulnerability has been discovered, affecting
20%
Using a Tablet as a Portable Management Console
14.11.2011
Home »  Articles  » 
 
remote administrative tasks, but they also give you that freedom that you never had before. But, that freedom that you so desperately seek might also bring along a lengthier chain attached to it. How can
20%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
remote administrative tasks, but they also give you that freedom that you never had before. But, that freedom that you so desperately seek might also bring along a lengthier chain attached to it. How can

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice