Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 261 Next »

37%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
” according to the assessments after the first tests hardly helped improve the situation. However, this criticism relates primarily to desktop use, and in particular to errors in the new Gnome version 3
37%
Revamp your software architectures with Domain-Driven Transformation
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © faithie, 123RF.com
When greenfield teams start a software project, it's all fun and easy. The developers respond to new requirements at lightning speed, and the users are thrilled. Development proceeds in leaps
37%
What's Hot for 2014?
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Mobile device security and The Internet of Things were both big topics at this year's Consumer Electronics Show (CES) in Las Vegas. Sure, there were gadgets galore, new-fangled televisions, and some
37%
If You Don't Like Security Guys, Call a Hacker
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Setsiri Silapasuwanchai, 123RF.com
their black-hatted counterparts – given the proper motivation, of course. A day rarely passes without reading about a new hack, a new breach, or a new dump of private information. Hackers, it seems, are always
37%
PowerShell for Exchange and SharePoint
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Olexandr Moroz, 123RF.com
, you can assume that four variants exist: Cmdlets that start with the new- prefix are used to create something (e.g., new-mailbox). Deletions are done with remove- (e.g., remove-mailbox), the set- prefix
37%
Windows Server 2012 Administration
07.06.2012
Home »  Articles  » 
 
to impress you. The most significant change you’ll see right away is the new “Metro” interface (Figure 1), with its large desktop icons and its horizontally sliding desktop; the old school Desktop interface
37%
DeepLocker: An AI Powered Malware
14.08.2018
Home »  News  » 
 
the enterprise environment safer. Fewer commentators are talking about the ways that bad actors are using the same machine learning capabilities to beat security and create a new breed of attacks. IBM is now
37%
Open Nebula 2.2 Includes GUI for Cloud Management
01.04.2011
Home »  News  » 
 
  In its latest 2.2 release the open source toolkit Open Nebula includes many new features and bug fixes. It can now detect the failure of a node and trigger appropriate recovery actions
37%
Peer 1 Launches HPC Self-Serve Cloud
14.06.2012
Home »  HPC  »  News  » 
 
the result is a fast, seamless, and secure solution that is available on demand. The announcement states that “Customers of the new HPC Self Serve Cloud can enjoy maximum performance of up to 665 teraflops
37%
Bugzilla Bug Allows Privilege Escalation
14.10.2014
Home »  News  » 
 
Mozilla has announced vulnerabilities in the Bugzilla bug-tracking tool used by software developers around the world.  The bug lets the attacker bypass email verification when setting up a new

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice