Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (60)
  • Article (3)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

9%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
, and q quits the Policy Editor without a prompt. Figure 3: Additional domains are created automatically by Tomoyo. Profiled Tomoyo Linux needs
9%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
configure clients and roll out firmware and also offers remote management and diagnostic options for support. The settings for the individual thin clients are established with the use of a profile. Profiles
9%
Security compliance with OpenSCAP
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitriy Pchelintsev, 123RF.com
definitions for the system and a prebuilt profile by called "F14-Default," which references a subset of all available OVAL definitions in order to validate the system. The command for doing this is as follows
9%
Advanced security in Windows Firewall
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Andrius Repsys, 123RF.com
with Advanced Security adds many new features: Controlling outbound data traffic Complex rules for inbound and outbound traffic Profile-based rules Signed and encrypted communication The user
8%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
 
be changed. You can download the entire brief from http://www.verisigninc.com/DNIB. Silver Tail Announces Profile Analyzer Silver Tail Systems has announced Profile Analyzer, which, according to the company
8%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
access via the iPhone configuration program [5]. Administrators can use the configuration program to create various profiles with settings. The profiles take the form of XML files that define the i
8%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
, creating all of those system profiles in the Cobbler database shouldn't be that much of a problem. Through intensive talks with the customer, I can determine what kind of systems they have and how
8%
Using Univention Corporate Server 2.4 for virtual infrastructure management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Martin B, Pixelio.de
virtualization server (passthrough), and multiple network interfaces can be assigned to any virtual instance. You also can set the Architecture parameter to automatic in the UVMM profile, thus telling the UVMM
8%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
provisioned by Warewulf Profiles : categories of nodes with a shared configuration Images : operating system payloads for deployment Overlays : built-in and site-specific customizations layered onto
8%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
to define "profiles" (or use a similar term). For example, you define a Linux MySQL profile, assign it to a subset of your machines, and the backup software automatically knows which directories to include

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice