Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1066)
  • Article (312)
  • News (198)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 158 Next »

11%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
.it domain (Listing 6). Table 1 Sample Policy Action Rule Type Selector Allow Include Emails ending in @vizards.it Listing 6
11%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
also is compatible with IPv4 and IPv6 because it resides one layer below in the OSI reference model. Because MACsec is implemented at a low level close to the hardware, it demonstrates high performance
11%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
the Microsoft site [6]. The tool is used to test connections for Outlook, smartphones, or Office 365. After selecting the desired test, enter the data for the Exchange Server you want to test and the user data
11%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
M 12345 5 36 F 12346 6 34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
11%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
Warp has an anti-virus solution based on the Kaspersky engine (Figure 6). Microsoft offers built-in anti-virus protection as of Exchange Server 2013. Figure 6
11%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
, simple bars, or histograms. Conky normally writes its output directly to the desktop – more specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate
11%
Linux for Windows Admins: Samba Shuffle
18.09.2012
Home »  Articles  » 
 
. Figure 5: Mapping a shared Linux folder from Windows. Select the share and then click OK to map the drive. In Figure 6, you see that the remote share has been mapped and opened on the Windows system
11%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
="/etc/portsentry/portsentry.blocked.atcp"; banudp="/etc/portsentry/portsentry.blocked.audp"; # TCP tcp=`tail -n1 $bantcp | awk '{ print $6 }' | cut -d / -f 2`; if [ `echo $tcp | grep '123.45.67.' ` ] || [ `echo $tcp | grep '89
11%
The Road to End-of-Scale
19.06.2013
Home »  HPC  »  Articles  » 
There by 2020” (see also Simon's slides from the Optical Interconnects Conference in Santa Fe, New Mexico, May 6, 2013). Can we keep extending the performance graphs of current technology and create an Exascale
11%
Managing Port Scan Results with Dr. Portscan
30.09.2013
Home »  Articles  » 
 
administrators who are responsible for part of a network to define the scope of the scan and the boundaries of the report in a web front end. Additionally, reporting will be improved for IPv4/IPv6 dual

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice