Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 108 Next »

12%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
In an age when laptops are more powerful and offer more features than high-performance servers of only a few years ago, whole groups of developers are discovering new opportunities in their data
12%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
, then an old laptop is probably better suited than a VM, because it avoids the virtualization layer between Kali and the network. Three Applications Once Kali is running, the tools can be divided roughly
12%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
for Windows Assessment Console (WAC). When installed on a laptop, WAC offers tests mainly optimized for evaluating the system's battery life (Figure 3). To work around this problem, you can select the Run
12%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
. If the company's own service laptop breaks down, an employee is practically unable to work until they are issued replacement hardware that is allowed to talk to the VPN
12%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
solutions such as Rsync came into play. However, Rsync requires a functioning network connection between systems. A company laptop that has to be connected to the VPN to get an Internet connection does
12%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
stores the data there. That aside, the BadUSB function is easy to use. Starting at the Main Menu, choose Bad USB , select the payload script, connect the device to the laptop, and Run the script. Flipper
12%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
burner to create the matching media. Also, even a fairly spartan laptop rarely comes with less than 8GB of RAM today, which easily is enough to run even a larger Grml image. Nevertheless, Michael Prokop
12%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
its own IP address, a concept that has potential for terminal devices (hosts, laptops) on IPv6. On the other hand, a service- or application-oriented technology like this is very close to shared hosting
12%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
candidate in the test, Phraseanet monitors directories specified by the admin and automatically imports new files. After creating the folder, users should create an empty file there called .phrasea
12%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
and users can track which app causes how much data traffic. Figure 1: Only one monitoring app among many: Network Log sniffing network traffic on a rooted

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice