Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 148 Next »

13%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
]: A very compact implementation of DTLS (TLS is not supported), which is very easy to run on Linux or Contiki and is well tested on constrained wireless networks like 6LoWPAN. TinyDTLS is very compact
13%
Managing containers with Podman
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © sandrobrezger, photocase.com
to map one of the container's network ports to a privileged port (<1024) on the host; this operation does not work if you have started the container with normal user privileges. In this case, you need
13%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
the hacker started the attack in the first place, or tries to spread further across the network. This spread is known as "lateral movement." The hacker now uses their internal view of the network to attack
13%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
within complex structures, especially networks. In this phase, the attacker collects confidential data to analyze configuration settings, network interfaces, and other communication channels
13%
New Exchange standard
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sermax55, 123RF.com
as a transport protocol standard for accessing Outlook and enjoyed a good reputation, in terms of stability. However, the protocol was not intended for constant network changes, and deficits began to show
13%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Wayne Daniels, 123RF.com
across the network. To help this evolving market, Intel is introducing QuickAssist technology. Intel QuickAssist Technology [1] provides security and compression acceleration capabilities to improve
13%
Integrating a Linux system with Active Directory
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Francesco Gallarotti on Unsplash
If your organization manages a network that includes both Windows and Linux machines, you might want to implement a unified authentication mechanism. Many businesses rely on Microsoft's Active
13%
News for Admins
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
 
for the factory floor," the announcement says. The solution is now generally available on Intel Core processors and supports Intel Time Coordinated Computing (TCC) and IEEE 802.1 Time Sensitive Networking (TSN
13%
Life cycle management with Foreman and Puppet
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© auremar, 123RF.com
, hardware, software, network, and so on. If you need more information, you can define custom facts. For example, if you want to install Apache2 as a web server, an excerpt from the manifest looks like this
13%
What's new in Microsoft Windows 8.1
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Doroto C-, 123RF.com
settings for the Start screen and others via group policy and centralized XML files, which administrators can distribute over the network. I will talk more about this later. Another new feature in Windows 8

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice