Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente" ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (934)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 133 Next »

15%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
, it supports IPv4 and IPv6. BGP can process and separate different types of information and contexts in these "address families." According to information from the American Registry for Internet Numbers (ARIN
15%
What's new in Samba 4
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Natalia Sheinkin, 123RF.com
to be invoked. [Bug 9651] 6. Windows clients complain that they cannot disable offline caching on the profile share [Bug 7810]. (This is a non-critical message and does not affect operation.) Issues 2 and 3
15%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
integrate existing data sources that are accessible via SMB/CIFS or Novell Core Protocol (NCP), for example, on Windows 2003/2008, Novell Open Enterprise 11 (OES), and NetWare 6.5.8 servers with at least one
15%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
authentication on the basis of text messages. Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
15%
Installing .NET on Linux
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © 36clicks, 123RF.com
. This happened about six months before .NET version 4.6 appeared. These events prepared the way for a larger community to be able to work on pushing development of the framework forward. Pressure from Java
15%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
Developers website [2]. Note that Red Hat offers all of the development tools free of charge [6]. The next step is to install the Vagrant tool from the default Fedora software repository. The accompanying
15%
Data Compression as a CPU Benchmark
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Lucy Baldwin, 123RF.com
methodical with his performance testing, providing a reference library of results for many CPU types [6], and prebuilt binaries of the tool exist for both Linux and Windows. A sampling of the results library
15%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
of software started [6], but the project was discontinued after some time in favor of Vagrant [7]. Vagrant has long enjoyed a good reputation as a manager for virtual machines and is often used to create
15%
Bpytop command-line monitoring tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Filip Mroz on Unsplash
of the tool. In September 2021, he announced a C++ port of the software to Linux called btop++ [6], although the OSX branch is still under development. For this article, I used bpytop because btop++ was not yet
15%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
directly from the repository [6]. The ATT&CK navigator can be used to mark relevant entries during research and to display correlations, thus letting you plan and trace your progress in securing

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice