Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (233)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 174 Next »

12%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
the hacker started the attack in the first place, or tries to spread further across the network. This spread is known as "lateral movement." The hacker now uses their internal view of the network to attack
12%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
within complex structures, especially networks. In this phase, the attacker collects confidential data to analyze configuration settings, network interfaces, and other communication channels
12%
New Exchange standard
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sermax55, 123RF.com
as a transport protocol standard for accessing Outlook and enjoyed a good reputation, in terms of stability. However, the protocol was not intended for constant network changes, and deficits began to show
12%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Wayne Daniels, 123RF.com
across the network. To help this evolving market, Intel is introducing QuickAssist technology. Intel QuickAssist Technology [1] provides security and compression acceleration capabilities to improve
12%
Integrating a Linux system with Active Directory
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Francesco Gallarotti on Unsplash
If your organization manages a network that includes both Windows and Linux machines, you might want to implement a unified authentication mechanism. Many businesses rely on Microsoft's Active
12%
News for Admins
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
 
for the factory floor," the announcement says. The solution is now generally available on Intel Core processors and supports Intel Time Coordinated Computing (TCC) and IEEE 802.1 Time Sensitive Networking (TSN
12%
Life cycle management with Foreman and Puppet
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© auremar, 123RF.com
, hardware, software, network, and so on. If you need more information, you can define custom facts. For example, if you want to install Apache2 as a web server, an excerpt from the manifest looks like this
12%
What's new in Microsoft Windows 8.1
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Doroto C-, 123RF.com
settings for the Start screen and others via group policy and centralized XML files, which administrators can distribute over the network. I will talk more about this later. Another new feature in Windows 8
12%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
the server. Conclusions SQL injection is still one of the most dangerous vulnerabilities that web administrators face on today's networks. The development of tools such as SQLmap makes it very easy
12%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
the client, you first need working network connectivity. For this reason, the first auxiliary function checks the availability of the computer and quits with an exit code if it is not given. The use of ping

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice