Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 113 Next »

10%
Open source calendar synchronization
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by jason hafso on Unsplash
. Figure 1: Kris shares a calendar with Alice and Bob. Their devices then access the shared calendars via their individual Nextcloud accounts. I tested the Nextcloud instance on a virtual server
10%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
for use in 15 seconds once the EC2 virtual machine has been initialized, compared with 18 seconds with Trusty Tahr (14.04). The more than doubling of the SSH startup time between Trusty and Xenial may show
10%
App Proxy support for Remote Desktop Services
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Iwona Castiello d'Antonio on Unsplash
, then install the Gateway role. For publishing applications shared in virtual sessions, select Session-based desktop deployment . Once the basic installation is complete, you will see a graphic on the target
10%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
persistent threats by executing them directly in a scalable, cloud-based, virtual sandbox environment. The report, which goes into detail about what the malware has done, gave me a link to VirusTotal [7], used
10%
Security issues when dealing with Docker images
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Kae Horng Mau, 123RF.com
own registries, connections to directory services, and centralized management of credentials. The Standard Edition will cost $1,500 per year and node (virtual machine or dedicated server). The Advanced
10%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
than a central location on the network. All of the solutions are free software except for MaxScale. And Galera? The previous top dog in the field of virtual synchronous replication in the MySQL camp
10%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
retrieving metrics data from the target systems ties up virtually no resources, it doesn't generate more load on the monitored systems. If one of the running instances fails, the idea is that you have enough
10%
Distributed Linear Algebra with Apache Mahout
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Galbraith, Fotolia.com
-batch systems such as Apache Spark) or streaming systems (e.g., Apache Flink). Additionally, Mahout is able to perform compute on multiple software and hardware systems, ranging from the Java Virtual Machine (JVM
10%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
. The first step is to create a sending profile by switching to the Sending Profiles menu and creating an initial configuration in New Profile . The description in Figure 1 uses a virtual machine (VM) on 192
10%
Archiving teams and channels
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Adis Corovic on Unsplash
, and virtually nobody keeps a backup permanently. A backup is mostly used in the short and medium term and has the task of restoring deleted or destroyed files. Archiving means long-term storage. Archiving

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice