Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 95 96 97 98 99 100 101 102 103 104 105 106 107 108 ... 138 Next »

28%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Basic performance data and health status of Windows computers can be collected and evaluated very easily and conveniently using PowerShell. The scripting language is an ideal candidate both
28%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
with Mailbox.org, unlike with Posteo, you need to supply your first and last names; these do not, however, have to be your real names. Heinlein is very particular with the password: The service will reject
28%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
and other nefarious SQL activities float your boat, then the mighty sqlmap is probably already known to you. It’s very slick, powerful, and incredibly dangerous. nmap Many people think Nmap
28%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
is probably already known to you. It's very slick, powerful, and incredibly dangerous. nmap Many people think Nmap is present in the hacker's toolkit just for probing ports and testing networks
28%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
in severity: Alteryx, Tesla, Uber, … the list goes on and on. The cybersecurity community is on high alert, and so is the executive suite. Forty-four percent of senior executives say that they feel "very
28%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
; otherwise, Graylog does not start root_timezone Canonical ID for time zone (e.g., Europe/Vienna) Very important root_email Email address of root plugin
28%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
already explored the extent to which a certain reader has a preference for each category, and the result is available in the form of a vector (Figure 5). You can create a very similar vector for each
28%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
work support very flexible use. On the one hand, they extend groupware packages like EGroupware, Zimbra, or Kopano. On the other hand, they also integrate into self-hosted cloud solutions
28%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
, VirtualBox, and KVM [5]. Alternatively, if you only want to try a short test, you can access an online demo [6]. To install the software yourself, you have to invest a little more time and patience. Very
28%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
and then sequentially browsing log entries. Kafka does not allow queries like ANSI SQL, which lets you search for a certain value. (3) The events in the log prove to be immutable – past events are very difficult to undo

« Previous 1 ... 95 96 97 98 99 100 101 102 103 104 105 106 107 108 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice