Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (225)
  • Article (68)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 34 Next »

40%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
40%
Windows Server 2016 for small servers
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © blas, Fotolia.com
The Windows Server 2016 Essentials management interface, known as the dashboard, has not changed since the 2012 version. From the dashboard, clients and users can manage the network centrally, even
40%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
802.11ax Year of publication 1999 1999 2003 2009 2013 2020 Frequency (GHz) 2.4 5 2.4 2.4 and 5 5 2
40%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of your development life cycle. Containers are far from being a new addition to server hosting. I was using Linux containers (OpenVZ) in production in 2009 and automatically backing up container images
40%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
Server 2012 R2, but most settings also work in previous versions and with Windows 7/8. You will learn how to restore entire servers and repair virtualized environments based on Windows, as well as how
40%
XP Apocalypse
20.08.2013
Home »  News  » 
 
vulnerability might apply to several Microsoft systems, which is why security patches are often released for all systems simultaneously. Rains points out, "Between July 2012 and July 2013, Windows XP
40%
Google Compute Engine Open for Business
10.12.2013
Home »  News  » 
 
Google has announced that the Google Compute Engine cloud service is now open to the general public. The Google Computer Engine, which was first unveiled at the Google I/O conference in 2012
40%
Lenovo Buys Motorola Phone Division
03.02.2014
Home »  News  » 
 
The Chinese manufacturer Lenovo is on a shopping spree. A week after acquiring the IBM x86 server division, Chinese PC giant has also purchased the mobile phone manufacturer Motorola Mobility from
40%
Slow Down on SPDY?
27.05.2014
Home »  News  » 
 
argues that the process for developing the HTTP 2.0 standard has so far been driven more by time constraints than the desire to achieve the best possible outcome. In 2012, the Internet Engineering Task ... An important FOSS developer calls for a reset on efforts to build Google's SPDY protocol into HTTP 2.0.
40%
Listing 6
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
 will allocate 4 cores 15 ### using 3 processors on 1 node. 16 #PBS -l nodes=1:ppn=3 17 18 ### Tell PBS the anticipated run-time for your job, where walltime=HH:MM:SS 19 #PBS -l walltime=0:10:00 20 21 ### Load

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice