Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (987)
  • Article (300)
  • News (171)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 147 Next »

28%
U-Move backs up, restores, and migrates Active Directory environments
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Erda Estremera on Unsplash
      * Enterprise $2,200   Support extension for one to five years costs 20 percent of the purchase price per year. System requirements   Backs up Microsoft Windows Server from version 2003 and Small Business
28%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Rgbspace, Fotolia.com
with matching ext2/3/4- or Btrfs partition, and make the stick bootable. Format the USB stick using ReaR: /usr/sbin/rear format /dev/sdX ReaR merely awaits confirmation that it may entirely overwrite the given
28%
Mobile device management with Microsoft System Center 2012 R2
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © konstantynov, 123RF.com
mobile endpoints with System Center Configuration Manager (SCCM) [1], enterprises need to have a Windows Intune subscription and connect this with SCCM. Windows Intune [2] is a cloud-based management tool ... Mobile device management with Microsoft System Center 2012 R2
28%
Security issues when dealing with Docker images
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Kae Horng Mau, 123RF.com
source license (Apache 2.0) in an irregular series of versions every few months. In early 2017, version 1.13 saw the 13th release appear since version 1.0 was published in June 2014. In early March
28%
Troubleshooting Kubernetes and Docker with a SuperContainer
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Sergey Nivens, 123RF.com
and lsof tools to view TCP port 80 and also check the internal eth0 interface IP address, which reports that IP address 172.17.0.2 is bound. I used the networking tools in Figure 6 to check
28%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
volumes: - type: volume destination: /var/lib/docker which brings up three container machines with hostnames kafka0 through kafka2, in which dockerd is later installed and configured (which
28%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
that can be deployed on both 4G and 5G technology. A 5G campus network is designed to meet special requirements (e.g., to allow Industry 4.0 [1] applications to communicate). The market for 5G campus
28%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
-m venv .venv && source .venv/bin/activate pip install flask flask-oidc itsdangerous==2.0.1 and run the application with the flask run command before heading to http://localhost:5000 . If everything
28%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
because access tokens in the OAuth 2.0 standard are usually only valid for one hour, after which you need to obtain a new token, which involves an in-depth reappraisal of the access context. At the end
28%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
is that companies need to invest more in their email security; in particular, protection against phishing attacks need significant improvement. This is where phishing penetration testing comes in: Gophish [2

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice