Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1153)
  • News (400)
  • Article (299)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 186 Next »

18%
Help Desk with FreeScout
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Nik on Unsplash
the objective: The developers see FreeScout as a help desk and shared mailbox application and as a direct competitor to established tools such as Zendesk and Help Scout. Open Source with Add-On Modules Free
18%
On the CD
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
) and is automatically logged in after boot. The root password is "root" and should be changed. The OpenSSH daemon is enabled and accepts root logins. Configuration After successful installation, the system is booted
18%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
then can the VPN client, for example, open a connection to the target system. Commercial Two-Factor Authentication Solutions Vasco is a Belgian manufacturer of two-factor authentication solutions
18%
Automating the Azure infrastructure using a command-line interface
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © nk88, photocase.com
the Mac. In the Terminal window, first open a connection to your Azure subscription. You'll need to provide your credentials. Enter the azure download command, which opens the browser of your choice
18%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
;06; Stepanov, Rose ;From Mathematics to Generic Programming ;Edison Wesley ;0320;28 2015;09; Whithurst, Jim ;The Open Organization
18%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
Interfaces button opens a dialog with the local interfaces that you can use for monitoring. The Input tab provides the network interfaces that Wireshark uses for sniffing. Equally important is Edit
18%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
. To open the Finder, press Cmd+Shift+G and enter the path (~\Library). Note that you have at least two Library folders: the system Library folder at the root level of your hard drive and the user Library
18%
Linux infrastructure servers for small and midsize businesses
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © stillfix, 123RF.com
as ClarkConnect. Like Oracle Linux or the former CentOS (today Rocky Linux), ClearOS is based on the open sources of Red Hat Enterprise Linux (RHEL). Unlike RHEL and Rocky, however, ClearOS is still based
18%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
for the remote (i.e., the target system). Pressing n opens the dialog for configuring a new cloud service. You will see a list of storage services, each of which has its own number. Simply enter the number
18%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
, but it is precisely this widespread use that makes Entra ID an attractive target for attackers. The reason is clear: An attacker gaining access to identity management can potentially open the door to a wide range

« Previous 1 ... 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice