Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 83 Next »

9%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
_edac ... EDAC was loaded as a module, so I examined the directory /sys/devices/system/edac: login2$ ls -s /sys/devices/ system/edac/ total 0 0 mc Because I can only see the mc devices, EDAC is only monitoring
9%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
Rainer W. Gerling ... 2fuTVWnj7LDsEh3NzrhjGYlhWmtvrXg3mlFelz/MZ 08 XrK6uAlp6206Hc669ylfhIcD9d7w0rc9Ms1DFCh5wzVRbnJJF51mW2nC 09 mh5C8E7xSw== 10 mozilla.org. 6074 IN DNSKEY 256 3 7 11 AwEAAcY1VDPt
9%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
as reliably as the rest of the PKI world. 4. Protocols A public website must support the TLS 1.0, TLS 1.1, and TLS 1.2 protocols. SSL 2 is obsolete and insecure. SSL 3 is also deprecated and, although
9%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
originally using PTA, this will also work as soon as you set it up. Restoring ADFS, if this was your previous authentication method, is much more complex. On the other hand, in a situation in which you
9%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
would be just the bare bones; the data would be missing. Persistent Data As is often the case in a cloud context, it is essential to distinguish between two types of data. On the one hand, the cloud
9%
Configuring Linux DNS Settings
15.04.2024
Home »  News  » 
 
and historically was in practice, customizing your device’s DNS is no longer an intuitive matter.” DNS is often considered the “phonebook” of the internet, Terrasi notes. “When you enter a URL containing a domain
9%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
by choosing a name that contains a DNS suffix appropriate to your situation. Make sure the DNS suffix is set to the Fully-Qualified Domain Name of your system. For example, if your DNS name is james.company.com
9%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
Heartbleed in 2014, a vulnerability in OpenSSL, and Log4j in 2021. In both cases, innumerable systems were affected. Back in May 2021, the United States introduced an obligation to provide a software bill
9%
Windows updates and patch distribution without WSUS
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Rob Thompson on Unsplash
separately. In addition to the resulting periods of slow Internet connectivity, this situation can cause significant additional costs if Internet access is billed by volume. In terms of its design, Windows
9%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
GlobalSign, change the previous entry as follows: domainname.tld CAA 0 issuewild "globalsign.com" Alternatively, by specifying both entries, you can allow wildcard certificates to be issued

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice