Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%2222%21490 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (397)
  • Article (115)
  • News (36)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 55 Next »

58%
Secure email communication
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Simon Moog on Unsplash
authorized outbound mail servers. Although designed in 2004, SPF only became the standard recommended by the Internet Engineering Task Force (IETF) in 2014 [2]. From a sample of more than 3,000 domains ... 2022
58%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
New software (e.g., the eSIM Business Manager, which EBF developed in cooperation with Deutsche Telekom [2]) can help in these scenarios. In conjunction with a UEM system, an eSIM manager makes ... 2022
58%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
everything down in more detail, while hopefully keeping things reasonably understandable. Maybe a word about one last set of innovations: We recently added support for FIDO2, PKCS#11, and TPM2 security chips ... 2022
58%
New features in Windows Terminal Preview
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Mohamed Shaffaf on Unsplash
might still need to be edited directly in the JSON file. Whether this will change by the time the final 2.0 version is released remains to be seen. Note that the key names are localized if you change ... 2022
58%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
[2]. For the Enterprise Matrix, you'll find preparatory techniques in the Reconnaissance phase on the left. On the far right, you'll find an attacker's potential activities after successfully hijacking ... 2022
58%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
logically separate individual parts of the system (Figure 2). A network namespace, for example, lets you create virtual network cards without giving them direct access to the physical NICs of the host ... 2022
58%
Managing BitLocker with PowerShell
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © sergey Mayorov, 123RF.com
in the new system settings in the pre-release version of Windows 11 and version 21H2 of Windows 10, it still takes you to the settings in the legacy Windows interface from the pre-Windows 10 era. You ... 2022
58%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
modules. Image courtesy VMware. [2] Architecture and Services Administrators use Workspace ONE to define user groups, policy settings, and device configurations. Users then access their applications ... 2022
58%
Configuring X Window input and output devices
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ilya lix on Unsplash
1: +DP-2-2 1080/510x1920/287+0+0 DP-2-2 2: +DP-2-3 1920/598x1080/336+1080+0 DP-2-3 You can use xrandr -q to see which modes the individual devices support. You can then set the desired mode ... Two command-line tools, xandr and xinput, let you optimize your X Window display from the terminal. ... Optimizing X Window Displays ... Configuring X Window input and output devices ... 2022
58%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
the password against a dictionary or for certain character strings. For example, although "2021" is not allowed in a password and the password manager will protest, it will still accept "2o21" as an entry ... 2022

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 55 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice