Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1019)
  • Article (296)
  • News (198)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 106 107 108 109 110 111 112 113 114 115 116 117 118 119 ... 152 Next »

15%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
: profile title: InSpec profile to check /etc/motd maintainer: Martin Gerhard Loschwitz copyright: Hutchison Drei Austria GmbH copyright_email: martin.loschwitz@drei.com license: Apache-2.0 summary: Tests
15%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
installing NxFilter: sudo service systemd-resolved stop sudo systemctl disable systemd-resolved.service sudo rm /etc/resolv.conf sudo echo 'nameserver 0.0.0.0' > /etc/resolv.conf NxFilter is also available
15%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
:\SSLBindings\0.0.0.0!443' Get-Item $certPath | New-Item $providerPath You can also check the bindings in IIS Manager or with Windows Admin Center. To do so, call up the settings of the website and check to see
15%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
Types "Unified" -MailEnabled $true -SecurityEnabled $true -LabelId f460a5b0-8d8e-4ac1-bb92-afb9ea22f9da If you followed the steps and created the LabelActions as shown in the example, the labeled team
15%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
/ssh/server.example.com-cert.pub /etc/ssh/server.example.com-cert.pub: Type: ssh-rsa-cert-v01@openssh.com host certificate Public key: RSA-CERT SHA256:uJbAVibJhbFXr0z5l0i/O08/fOwMq+JGbCDqz+/PJ7s Signing CA: RSA SHA256:vIQWA43cZ4b6
15%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © 36clicks, 123RF.com
directory (e.g., /usr/local/bin on Linux). The source code is written in the Go programming language, lives on GitHub [8], and is subject to the Mozilla public license version 2.0. Bindlestiff Developers
15%
Welcome to ADMIN
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Jakub Krechowicz, 123RF.com
NT 3.51. I pined for Windows NT 4.0. I did not, however, mourn for Windows 2000, and Vista remains all but unmentionable to this day. However, Windows XP and Server 2003 are special. It's harder to say
15%
Remotely managing web access servers
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Petre Coman, 123RF.com
to have at least the web server (IIS), .NET Framework 4.5, and PowerShell 3.0 installed on the server on which you run the gateway. You can install PowerShell Web Access with Server Manager or Power
15%
The 10 best tricks for taming Ansible
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © neoleo3d, 123RF.com
the names of the system's network cards and, therefore, the counterpart to n7p1 on the workstation is ens7f0 – not that there are seven network cards in the computer. Coulda, woulda, shoulda. The reality
15%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
no overview of supported providers in the documentation. Outlook itself can be restricted significantly by applying rule 26190899-1602-49E8-8B27-EB1D0A1CE869 when creating child processes. Different rules

« Previous 1 ... 106 107 108 109 110 111 112 113 114 115 116 117 118 119 ... 152 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice