Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (229)
  • Article (70)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 35 Next »

41%
Forum Approves Requirements for SSL/TLS Certificates
29.12.2011
Home »  News  » 
 
and profiles, CA security, revocation mechanisms, use of algorithms and key sizes, audit requirements, liability, and privacy. These “Baseline Requirements” will take effect July 1, 2012, giving CAs time
41%
CERN Announces an Effort to Update its Particle Physics Strategy
17.10.2018
Home »  HPC  »  News  » 
 
Council president Sijbrand de Jong, “The Standard Model, our theory that best describes the known forces and particles, is unbelievably successful and was crowned by the discovery of the Higgs boson in 2012
41%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
separate licenses for local use in a VHD(X). The price per minute only applies to operation in Windows Azure. You can use Software Assurance license mobility to transfer your System Center 2012/2012 R2
41%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
Kazutaka Morita launched the Sheepdog project [1] in 2009. The primary driver was the lack of an open source implementation of a cloud-enabled storage solution – as a kind of counterpart to Amazon
40%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
40%
Windows Server 2016 for small servers
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © blas, Fotolia.com
The Windows Server 2016 Essentials management interface, known as the dashboard, has not changed since the 2012 version. From the dashboard, clients and users can manage the network centrally, even
40%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
802.11ax Year of publication 1999 1999 2003 2009 2013 2020 Frequency (GHz) 2.4 5 2.4 2.4 and 5 5 2
40%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of your development life cycle. Containers are far from being a new addition to server hosting. I was using Linux containers (OpenVZ) in production in 2009 and automatically backing up container images
40%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
Server 2012 R2, but most settings also work in previous versions and with Windows 7/8. You will learn how to restore entire servers and repair virtualized environments based on Windows, as well as how
40%
XP Apocalypse
20.08.2013
Home »  News  » 
 
vulnerability might apply to several Microsoft systems, which is why security patches are often released for all systems simultaneously. Rains points out, "Between July 2012 and July 2013, Windows XP

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice