Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (987)
  • Article (300)
  • News (171)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 128 129 130 131 132 133 134 135 136 137 138 139 140 141 ... 147 Next »

28%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
sessions with Google Authenticator [17]. The Google Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator
28%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
, testing, and production. The hub VNet typically contains shared resources, such as firewalls (Figure 2) or VPN gateways, and manages traffic to and from each spoke VNet that hosts the Linux workloads
28%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in the scope of Industry 4.0 or smart factory initiatives. Although cyber risk management is required by law (e.g., in NIS2), ASM is not. However, any company that becomes aware of attack surfaces as part of its
28%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
and in heterogeneous environments. FreeNAS also supports AFP for Mac OS X environments, including Time Machine backups. Each service can be configured from its corresponding wrench icon (Figure 2
28%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters] DWORD DomainCompatibilityMode 1 DWORD DNSNameResolutionRequired 0 The preceding code tells the registry to add two DWORD
28%
Rex
19.02.2013
Home »  Articles  » 
formulated task, you can simply issue, for example, the rex apache2 command to install apache2 on all your web servers and kit them out with the appropriate configuration files at the same time. By the way
28%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
and then run the interpreter against the file (Figure 2): coffee hello.coffee Figure 2: The command-line tools in action: first, the interpreter executes
28%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator client runs on Android, iOS, and BlackBerry devices
28%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
in Figure 2, which gives you three install choices: Install from Internet , Download Without Installing , and Install from Local Directory . If you select Install from Internet (recommended), read the note
28%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
. That means you need to define a different separator – the new separator follows the option with the angled brackets: hostlist relay_from_hosts = <; 85.214.7.0/24; 2a01:238:10b::/56 If you are configuring

« Previous 1 ... 128 129 130 131 132 133 134 135 136 137 138 139 140 141 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice