Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 183 Next »

13%
New features in Windows 10
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Pei Ling Hoo, 123RF.com
revised the Start menu in Windows 10 and provides users with numerous adaptation methods (Figure 3). Figure 3: The redesigned Start menu in Windows 10 can
13%
Exchange Online migration with the Hybrid Agent
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Natee Srisuk, 123RF.com
mailboxes. You will also want to test accessibility from an external source. Next, try creating mailboxes. You can now create mailboxes for Exchange Online in the local EAC (Figure 3), although you may
13%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
be processed by WDAC in the same way as any other signed application. You can use catalog files [3] to block all unsigned applications and allow only signed apps and drivers to run. WDAC Policies Creating WDAC
13%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
to be executed by low-skill assembly line workers. Some of the most important sea changes in software have taken aim at these metaphors: take the agile software development movement [3], for instance. It took aim
13%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
exploits like the OpenSSH bug CVE-2002-0083 [2] show that sometimes changing just one bit is sufficient to install a backdoor [3]. For sophisticated attacks, attackers could dump a kernel rootkit
13%
Domain name resolution with DNS over HTTPS
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Sergejus Bertasius, 123RF.com
.gtld-servers.net. redhat.com. 172800 IN NS ns2.redhat.com. redhat.com. 172800 IN NS ns3.redhat.com. redhat.com. 172800 IN NS ns1.redhat.com. redhat.com. 172800 IN NS ns4
13%
VMware AirWatch mobile device management
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Sychugina Elena, 123RF.com
features of the mobile devices, the administrator can manage which configuration changes need to be controlled actively (Figure 3). For example, the existence of a special version of an app can be queried
13%
Continuous upgrades for Windows 10
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © golffoto, photocase.com
rings that are assigned corresponding delay values. For example, ring 1 receives the Semi-Annual Channel immediately and ring 2 after 30 days; ring 3 receives the Long-Term servicing channel (formerly
13%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Image courtesy Swapnil Bhartiya
distributions to make the Free Software Foundation (FSF) list of "Free GNU/Linux Distributions" [3], which means that it does not provide "non-free programming platforms, non-free drivers, non-free firmware
13%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
Crypt ransomware (which is also known as AlphaCrypt) seems to be backed by a fairly established team. Some years ago, CryptoLocker became famous for blackmailing its way to a $3 million fortune. TeslaCrypt is just

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice