Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (782)
  • Article (248)
  • News (27)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 106 Next »

17%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
because, if you choose not to use it, there is no effect. All of the above features and others are described in greater detail in the MariaDB Knowledgebase [3]. Compatibility With MariaDB, every effort
17%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
-encrypted hard drives (SEDs). However, not everyone is using encryption. Recent revelations about accessing the data of individuals includes the story about how the NSA and Britain’s Government Communications
17%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
RTC is made up of separate IETF and W3C standards, currently in Candidate Recommendation status, with each covering a different aspect of setting up a peer-to-peer connection. The essential parts include
17%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
extensively covered by the CSA in Domain 6 "Portability an Interoperability" [5] of their Security Guidance for Critical Areas of Focus in Cloud Computing. Security as a Service (SecaaS) SecaaS is by far
17%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
– the Argonne Leadership Computing Facility (ALCF) and the National Energy Research Scientific Computing Center (NERSC) – with, according to the report, "multiple 10s of teraflops and multiple petabytes
17%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stockbksts, 123RF.com
\AppData\Local\Microsoft\Windows\TemporaryInternetFiles\Low\Content.IE5\S6OU8I07\view-upsell[1].html, which is the Amazon shopping cart. Figure 1: Results
17%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
for different security requirements: GnuPG Desktop [3] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
17%
Security after Heartbleed – OpenSSL and its alternatives
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Ilya Masik, fotolia.com
? Actually, warning voices were heard for some time, particularly at the FOSDEM 2014 conference [3] (Figure 2). Figure 2: At FOSDEM 2014, BSD developer Poul
17%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
, but the backup mechanism always uses encryption, and the Hub handles key management. Backups can be saved in the Amazon S3 cloud service and are always available for download via the GeoIP tag to the nearest data
17%
Introduction to HDF5
22.02.2017
Home »  HPC  »  Articles  » 
 ) }       DATA {          1, 2, 3, 4, 5, 6,          7, 8, 9, 10, 11, 12,          13, 14, 15, 16, 17, 18,          19, 20, 21, 22, 23, 24       }    } } } HDF5 has many ways to represent the same datatype

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice