Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1005)
  • Article (294)
  • News (153)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 146 Next »

16%
Oracle Database 12c: Cloud computing with multitenant architecture
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Jakub Jirsak, 123RF.com
, of memory to be able to start each instance. The buffer pool and the shared pool have very little space in which to fulfill their functions. As a result, at least 6x10 background processes are competing
16%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
percent of the vulnerable versions have safer alternatives available. 3.6 percent of dependencies are still vulnerable because they were updated to another insecure version. Reliance on end
16%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
the Microsoft site [6]. The tool is used to test connections for Outlook, smartphones, or Office 365. After selecting the desired test, enter the data for the Exchange Server you want to test and the user data
16%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
M 12345 5 36 F 12346 6 34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
16%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
Warp has an anti-virus solution based on the Kaspersky engine (Figure 6). Microsoft offers built-in anti-virus protection as of Exchange Server 2013. Figure 6
16%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
, simple bars, or histograms. Conky normally writes its output directly to the desktop – more specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate
16%
Linux for Windows Admins: Samba Shuffle
18.09.2012
Home »  Articles  » 
 
. Figure 5: Mapping a shared Linux folder from Windows. Select the share and then click OK to map the drive. In Figure 6, you see that the remote share has been mapped and opened on the Windows system
16%
Mobile PC Monitor
20.02.2012
Home »  Articles  » 
 
6). Figure 6: Setting notification preferences for system performance thresholds. I left the … processor usage is below selection unchecked
16%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
="/etc/portsentry/portsentry.blocked.atcp"; banudp="/etc/portsentry/portsentry.blocked.audp"; # TCP tcp=`tail -n1 $bantcp | awk '{ print $6 }' | cut -d / -f 2`; if [ `echo $tcp | grep '123.45.67.' ` ] || [ `echo $tcp | grep '89
16%
Network Grep
26.11.2012
Home »  Articles  » 
 
under the default network interface and offers the following information in addition underneath: filter: (ip or ip6) and ( port 23 ) match: ((^login\W)|(\Wlogin$)|(\Wlogin\W)) Here, ngrep is saying

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice