Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 99 Next »

20%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Despite cloud and file servers on the corporate network, users still store important files on the local hard drives of their workstations or laptops. Modern solid-state drives (SSDs) lull users
20%
Acceptable Risk
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Andrew Brown, 123RF.com
secret and to maintain a high level of personal security: locking their laptops, preventing over-the-shoulder spying, using a secure VPN connection, keeping anti-virus programs up-to-date, and leaving
20%
News for Admins
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
 
-in in the desktop Linux world. The Linux Mint site was hacked earlier this year. Zero Day UEFI Exploit Affecting Lenovo, HP, and Gigabyte Laptops Dmytro Oleksiuk, a security researcher, has discovered a zero
19%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
in your possession a corporate laptop conveniently loaded with Windows XP, Vista, or 7: You need an introduction to PuTTY and Xming and a short refresher on Cygwin. Windows-to-Windows connectivity comes
19%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
for moving data (1) with scp , sftp , or another command-line interface (CLI) tool and (2) by mounting remote storage from the cluster on the local machine. CLI Tools on a Linux Machine Assume that you have
19%
News for Admins
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
 
Hard Drive Imagine an episode of Mr. Robot where Elliot could crash the target hard drive remotely using ultrasonic signals. This story is closer to reality than it seems. Security researchers from
19%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
as a managed service that are accessible remotely on a variety of clients, including desktop systems, laptops, and even the iPad. However, the platform can be a bit tricky to spec out, so VMware is providing
19%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
the machine. According to ESET Research, "The Win32/StealthFalcon backdoor, which appears to have been created in 2015, allows the attacker to control the compromised computer remotely" (https
19%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
with an inductive receiver also lets you discover the remote end of a cable if the assignment is otherwise unclear. Active Tests Next, LanXPLORER is ready for a number of active network tests. If you use Power over
19%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
. User licenses give users access to a server from their devices (e.g., PCs, laptops, tablets, or smartphones). To find the best approach for an enterprise, you always need to do the math. Licenses

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice