Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1126)
  • News (395)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 183 Next »

19%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
Figure 4: Successfully connected to the Windows box at 192.168.1.129. The iscsiadm command is an open-iscsi administration utility that allows discovery and login to iSCSI targets, as well as access
19%
Web-based network monitoring
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © arasdubov, 123RF.com
browser on http://127.0.0.1:9000 and log in as admin with the default password bloonix . The service's web interface first opens a dashboard on which you can view the active services and check out
19%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
. The open source software updates the inventory independently, integrating access to all systems by SSH or remote desktop. In the centralized, web-based dashboard, the inventory shows all systems
19%
HPC Container Maker
13.06.2018
Home »  HPC  »  Articles  » 
and libraries for building the application(s) and its dependencies. For both users and developers, the containers can be executed as they’ve been created, or you can open a shell into the container. From
19%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
protocol before version 1.3 have opened the possibility of protocol downgrade attacks (Logjam to export-grade cryptography, FREAK to a weak RSA key exchange), connection renegotiation attacks (TLS Renego
19%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
regularly causes problems in the enterprise, is suppressed in Collabora Online. Collabora Online processes documents in the free open document formats as well as the current and older Microsoft formats
19%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
licenses exist that can be built into popular open source playback software. As additional copy protection, all current Blu-ray players integrate the Blu-ray+ technology developed a good 10 years ago
19%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
The first time you roll out a Kubernetes test cluster with kubeadm, superuser certificate-based access is copied to ~/.kube/config on the host, with all options open. Unfortunately
19%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
. If an appliance takes care of all these tasks, it needs to meet the customer's individual requirements precisely. The UTM Firewall by Endian, a company founded in 2003, is one of the few open source firewalls
19%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
Back on the 'bookworm' system, I want to deploy the open-iscsi package [3] (the RFC 3720 iSCSI implementation for Linux). To create a secure infrastructure, couple it by installing the cryptsetup package

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice