Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1060)
  • Article (311)
  • News (197)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 158 Next »

11%
Five graphical database front ends
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © yewkeo, 123RF.com
Office [6] and OpenOffice [7]. It is not uncommon for Base to end up automatically on your drive when you install these office suites. If not, you can usually install manually from the package sources. When
11%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
website [6], include libpcap , OpenSSL, the BIND8 library, libz , Bash, and Python. Installing from source requires additional dependencies, including Swig, Bison, and Flex. I found that each
11%
OpenStack: Shooting star in the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Vladimir Nenov, 123RF.com
OpenStack, Neutron [6] is also modular: The API is extended by a plugin for a specific SDN technology (e.g., the previously mentioned Open vSwitch). Each plugin has a corresponding agent on the computing
11%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
.it domain (Listing 6). Table 1 Sample Policy Action Rule Type Selector Allow Include Emails ending in @vizards.it Listing 6
11%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
also is compatible with IPv4 and IPv6 because it resides one layer below in the OSI reference model. Because MACsec is implemented at a low level close to the hardware, it demonstrates high performance
11%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
the Microsoft site [6]. The tool is used to test connections for Outlook, smartphones, or Office 365. After selecting the desired test, enter the data for the Exchange Server you want to test and the user data
11%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
M 12345 5 36 F 12346 6 34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
11%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
Warp has an anti-virus solution based on the Kaspersky engine (Figure 6). Microsoft offers built-in anti-virus protection as of Exchange Server 2013. Figure 6
11%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
, simple bars, or histograms. Conky normally writes its output directly to the desktop – more specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate
11%
Linux for Windows Admins: Samba Shuffle
18.09.2012
Home »  Articles  » 
 
. Figure 5: Mapping a shared Linux folder from Windows. Select the share and then click OK to map the drive. In Figure 6, you see that the remote share has been mapped and opened on the Windows system

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice