Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (233)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 174 Next »

13%
Multifactor authentication with Google Authenticator
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © iofoto, Fotolia.com
configuration: auth required pam_unix.so or the corresponding include command: @include common-auth Anyone already working on a supposedly secure network might get tired of constantly looking at their mobile
13%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
Russian FindFace App is a Privacy Nightmare The machine-learning capability that social networks are gaining is becoming a privacy nightmare
13%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
on company networks can be attacked in many ways. You need to make a distinction between user access and privileged access. © Microsoft [2] In contrast to a local AD, restoring access to the Entra ID
13%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
and extend the system's functionality." For example, the company states that the system provides easier integration with existing networks, visual server configuration and management, and other benefits
13%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
server. According to the announcement, Zentyal aims to provide small- and medium-sized businesses with "professional, reliable, and secure network infrastructure solutions that are both easy to use
13%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
for the virtual machine, copies the image file for the virtual disk, and gives the network adapter a new, random MAC address. The remaining hardware components remain unchanged. After cloning, however, much manual
13%
Virtualization with Microsoft Hyper-V
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Roman Sigaev, 123RF
. This setup works both with cluster shared volumes and with SANs or iSCSI solutions. If you use a separate network for cluster communications, make sure that the client for Microsoft networks and file
13%
Controlling multiple systems simultaneously with Synergy
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
©Kheng Ho Toh, 123RF.com
To operate Synergy, you need at least two PCs, each with its own operating system, monitor, and functional network card. The software supports Windows 95 through Windows 7, Mac OS X as of version 10
13%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
-Pprinter | grep -q "printer is ready" To match the output from lpq, you need to modify the search string for grep. The ping command checks network connections. The exit error codes differ, depending
13%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
in awareness training courses is the man-in-the-middle attack, in which attackers intercept data traffic on unsecured networks, such as public WiFi networks in hotels or cafés. Because almost all web

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice