Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (226)
  • Article (68)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 34 Next »

41%
Symantec Code Exposed
19.01.2012
Home »  News  » 
 
are no indications that customer information has been impacted or exposed at this time.” The Reuters news article is available at: http://www.reuters.com/article/2012/01/06/us-symantec-code-idUSTRE80523W20120106.
41%
Symantec Patches Code Breach
01.02.2012
Home »  News  » 
 
of this incident, but on January 27, 2012, Symantec released a patch that eliminates known vulnerabilities affecting pcAnywhere 12.0 and pcAnywhere 12.1. At this time, Symantec recommends that all customers
41%
ISC Moving to Leipzig
12.07.2012
Home »  HPC  »  News  » 
 
and exhibition grew, ISC later moved to Heidelberg, for several years and then in 2006 moved to Dresden. After three years of continued growth, the conference moved to Hamburg, where attendance has grown about 20
41%
SSH Communications Launches CryptoAuditor
02.08.2012
Home »  News  » 
 
SSH Communications Security recently announced its CryptoAuditor solution at the Black Hat USA 2012 conference. This module helps prevent data loss across encrypted secure shell, RDP, and SFTP
41%
Cloudyn SaaS Solution
15.02.2012
Home »  News  » 
 
) compute and database services and is developing integration with other cloud environments. Cloudyn’s full product offering will be provided free of charge to early adopters until May 1, 2012. After May 1
41%
Forum Approves Requirements for SSL/TLS Certificates
29.12.2011
Home »  News  » 
 
and profiles, CA security, revocation mechanisms, use of algorithms and key sizes, audit requirements, liability, and privacy. These “Baseline Requirements” will take effect July 1, 2012, giving CAs time
41%
CERN Announces an Effort to Update its Particle Physics Strategy
17.10.2018
Home »  HPC  »  News  » 
 
Council president Sijbrand de Jong, “The Standard Model, our theory that best describes the known forces and particles, is unbelievably successful and was crowned by the discovery of the Higgs boson in 2012
41%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
separate licenses for local use in a VHD(X). The price per minute only applies to operation in Windows Azure. You can use Software Assurance license mobility to transfer your System Center 2012/2012 R2
41%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
Kazutaka Morita launched the Sheepdog project [1] in 2009. The primary driver was the lack of an open source implementation of a cloud-enabled storage solution – as a kind of counterpart to Amazon
40%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice