Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 Next »

8%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
standards-driven groupware, Kolab [1] has had little to offer in this scenario. Only its own clients (Kontact; the Horde web interface and, later, Roundcube; and some proprietary Outlook plugins) can use
8%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
. In some cases, Windows system files are destroyed so that Windows still boots, but errors appear or some features fail to launch. In this case, you can either go back to a system restore point or call
8%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
, and each driver is assigned a storage class. If an application creates a Persistent Volume Claim (PVC), it can be given the name of the storage class. As a rule, every Kubernetes cluster has a storage class
8%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
://www.owncloud.org http://www.cozy.io – http://www.git-annex.branchable.com   – http://www.pyd.io http://www.seafile.com http://www.sparkleshare.org http://www.tonido.com
8%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to analyze an attack or pen test as it occurs (i.e., the "other side," as it were, of an attack). Indicators of Attack and Compromise Before I stampede into the tools an analyst uses, it's important
8%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
aggressors together than go it alone, according to CrowdSec [1], an open source cloud service and participative intrusion protection system (IPS) capable of analyzing the behavior of systems and providing
8%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
scenarios, as opposed to the entire problem space in abstract. What does network performance look like in AWS Elastic Compute Cloud (EC2) when using familiar tools? Amazon's Network At its simplest
8%
Setting up HTTP/2 on the Apache HTTP Server with PHP compatibility
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ave Calvar on Unsplash
and reducing latency. For that reason, setting up HTTP/2 will enhance the performance of the websites running on your server. If your website uses PHP, however, you'll need to go to a little more effort
8%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
the classic tools against it, including backup or replication tools such as rsync. Give S3QL a whirl – it has some really cool features. Infos Amazon S3: http://aws.amazon.com/s3/ Amazon S3 web
8%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
Because of its many security weaknesses, Microsoft Windows is considered particularly vulnerable to malware such as viruses, worms, and Trojans. However, because the operating system has more

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice