Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (110)
  • Article (39)
  • News (34)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 Next »

26%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
As early as the beginning of the 2010s, Google presented an alternative method for exchanging data between client and server with the SPDY protocol, which defined an increase in responsiveness and solved
26%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
a hierarchy. The DNS root servers have provided support for DNSSEC and corresponding keys since 2010. They use them to sign the keys, which in turn are used to sign keys for the top-level domains. The key
26%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
additional licenses. For example, if you migrate from Windows Server 2008 R2/Exchange Server 2010 to Exchange Server 2013 with a CAL suite, the CAL suite remains valid. In this case, too, you need
26%
Managing Office 365 in PowerShell
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © sellingpix, 123RF.com
to Hybrid Deployments with Exchange 2010/2013. Licenses To manage Office 365, you first need to store some important information about your subscription, the stored users, and configured settings. The most
26%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
Box Linux simply contains too many tools to examine at any great level of detail. Certainly, it's a mature security toolkit that first appeared as a September 2010 release candidate. At the time of writing
26%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
from secure sites" by Dan Goodin: http://www.theregister.co.uk/2008/09/11/cookiemonstor_rampage/ "Firesheep: Baaaaad News for the Unwary" by Brian Krebs: http://krebsonsecurity.com/2010/10/firesheep
26%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
ext4 extents: http://digital-forensics.sans.org/blog/2010/12/20/digital-forensics-understanding-ext4-part-1-extents Kernel.org ext4 documentation: https
26%
Exploring Apache CloudStack
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Utemov, fotolia.com
developed the Java Virtual Machine at Sun. Although early versions were very much focused on the Xen Hypervisor, the team soon realized the benefits of multi-hypervisor support. In early 2010, the company
26%
An introduction to FreeNAS
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Mario Lopes, fotolia.com
NAS [1] began to take shape as an actual product. It came to include a range of services, from file sharing to media streaming. By 2010, however, Cochard-Labbé was no longer able to commit sufficient time
26%
Hands-on Exchange rights management
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Isaac Marzioli, 123RF.com
DistributionGroups management role group in Exchange Server 2010/2013 can add or remove members of certain distribution groups and remove and create distribution groups. These are the kinds of operations that administrators

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice