Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 138 Next »

28%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
you can assign a task to a member of your team, select a card and press Edit . Although this step can help with planning, with no overview of the tasks assigned to you, you will not find it very useful
28%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
-Hellman (ECDH) key exchange that provides strong security against classical adversaries. At the same time, the X25519 approach is highly efficient, requiring very short key sizes and computation times
28%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
and more than 1PB of data? Moreover, the answers constantly change because users are adding, modifying, and deleting data, but understanding – or at the very least, monitoring – your filesystem holistically
28%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
the classic Environment Modules, sometimes referred to as TCL/C Modules because the modules are written in TCL, and I have been very pleased with it, but lately I have found some tasks difficult or impossible
28%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
ransomware and the sword of Damocles called the General Data Protection Regulation (GDPR) in the event of a possible data loss. Surprisingly, very few ADs are up to these requirements in terms of delegation
28%
Free Enterprise Backup with Bareos
12.11.2013
Home »  Articles  » 
the Windows Firewall. The File daemon and tray monitor are configured so that they work immediately. A very good system for disaster recovery of Linux machines is available from the Relax-and-Recover (REAR
28%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
very active development, with hundreds of thousands of downloads for each release – more than 5.5 million in total since its inception. Although FreeNAS was designed for home and small office
28%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
established norms, it can affect the user experience, your brand, and your very online success. E-commerce Abandonment – As shown in the statistics above, e-commerce is very sensitive to load times. Every
28%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
that standard Windows 8 systems seem to have is that they don’t use the DNS header information that Samba expects. Also, the Windows 8 systems I’ve tested default to a very strict interpretation of DNS. You can
28%
SmartOS: Cool Cloud Platform Rises from the Ashes of Solaris
10.06.2014
Home »  Articles  » 
that work with KVM. KVM for Solaris Before the KVM port, SmartOS already had Zones, which originated with Solaris, that offered operating system virtualization with containers and very little ballast

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice