Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1259)
  • News (417)
  • Article (308)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 ... 200 Next »

12%
TheSSS: World's Smallest Server Suite
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © zhao lizu, 123RF.com
anonymous access without a password and provides the files below /var/ftp/. The PHP version of TheSSS also includes the MariaDB database, which is automatically launched with the web server. You can
12%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
] provides an open source framework for precisely this task. Gophish at a Glance In view of the huge relevance of the phishing problem and the associated threat situation, surprisingly, most companies rely
12%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
a data throughput of less than 100Mbps, which often turns out to be a bottleneck. According to the developers, SoftEther provides speeds of more than 900Mbps. Performance is achieved through utilization
12%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
The best way to be sure you can change the credentials is to do it for every device, at least once. A good practice, for example, is to replace the factory-provided credentials on your device right after
12%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
of these classic HPC languages are subject to a standardization process that ensures the integration of new language features at regular intervals. Table 1 provides an overview of the last three standard versions
12%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
Stable Internet connections (uplinks) are mission critical in many enterprises. Unfortunately, they often break down. If you want to connect two uplinks redundantly using two or more providers, you
12%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
In the form of System Center Orchestrator (SCO) [1], Microsoft provides a tool for automating the workflows and processes of an IT infrastructure. This promises to save valuable time and money
12%
An interview with CoreOS cofounder Brandon Philips
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Brandon Philips
of software and industry innovators. This innovation has turned containers into a secure, agile development and deployment platform. With the high portability container infrastructure provides, users
12%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
software is typically impossible. Instead, you need customized products that were specially developed for use in OT environments. Over-the-air (OTA) updates: Although OTA programming provides a convenient
12%
News for Admins
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
 
and automatically provides update recommendations that are ready to review, test, and apply, making it easier to maintain quality and consistency across the development life cycle," Red Hat says. Dell APEX Cloud

« Previous 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice