Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 171 Next »

13%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
by the name vax. It is best to copy the binary into a directory that is in the path, for example, /usr/bin or $HOME/bin. To give the emulator networking capabilities, you need to install the developer package
13%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
life cycle phases of a monster VM, which are difficult to create, manage, and move. The challenges include: clean configuration of the physical server (BIOS, CPU, memory, network cards), correct
13%
Better Active Directory with Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Sattapapan Tratong, 123RF.com
Active Directory is the heart of most Windows networks, and now a new version of Windows Server 2012 brings several improvements over the previous version. One important advantage is the easy
13%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
– such as enabling the network or launching the httpd. Each of these tasks is a job from Upstart's point of view, but it will only take on a job if a matching event has occurred previously. An event of this kind could
13%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
of managed devices on your network. The next task isn't as easy. For it, you must tally the different mobile device types you deal with. Think of the possible options facing you: Windows Mobile's various
13%
A free anti-spam tool for Exchange environments
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© baurka, 123RF.com
with a large volume of email. The best option is to use a Linux server – for example, Ubuntu or Debian. That said, however, administrators on Windows networks do have the option of running ASSP on Windows
13%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
whose addresses are then scanned to find open ports and thus identify services running on them. SNMP queries also provide detailed information about components and status, especially for networks
13%
Amazon to Offer DDoS Protection of AWS Users
07.12.2016
Home »  News  » 
 
for volumetric attacks, intelligent attack detection, and mitigation for attacks at the application and network layers. Customers also get 24/7 access to Amazon’s DDoS Response Team (DRT) for custom mitigation
13%
One Hacker Could Have Taken Control of Macs Used by IT Professionals
14.08.2018
Home »  News  » 
 
for securely connecting to computers on a network. Holmes  informed the Homebrew crew and they fixed it within a matter of hours. The moral is, just because it’s open source does not mean that it’s safe. Open
13%
Turing Pi Now Offers a Raspberry Pi Kubernetes Cluster
04.05.2020
Home »  News  » 
 
modules which are interconnected with a 1 Gbps network (although each node is limited to 100 Mbps USB speed) and can share RAM and storage between the nodes. Other features include multiple I/O, nodes power

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice