Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 201 Next »

17%
Hands-on Exchange rights management
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Isaac Marzioli, 123RF.com
to the role group you saved as a variable in step 1. To add a universal group, use the Get-Group cmdlet. 3. Repeat step 2 for each substitute you want to add. 4. Set-RoleGroup "
17%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
and follow the interactive prompts to create a new partition. Format the partition with your chosen filesystem (e.g., ext4). Next, create a mount point and mount the disk. To ensure the disk mounts
17%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
an initial evaluation of the environment. They provide the installation packages for Ubuntu 20.04/22.4, CentOS 8, and Debian 11, along with Docker, virtual machine (VM) images, and an online demo [2]. If you
17%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
the detailed instructions for installation because they are documented on the project's website [4]. The procedure will be a breeze for system administrators and power users, but some basic IT knowledge
17%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
Anchore. The basic functions are easily explained: The Falco [4] services run in their own containers – for example, within Kubernetes, where they can be rolled out quickly using the Kubernetes package
17%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © crazymedia, 123RF.com
the Failover Various actions can be performed in the Overview of a backed-up machine, including Test Failover , Cleanup test failover , Commit , Resynchronize , and Change recovery point (Figure 4). Certain
17%
Simple, small-scale Kubernetes distributions for the edge
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © grafner, 123RF.com
that will then also run on free systems such as Fedora without a Quay account. The current upstream documentation also leaves a lot to be desired: It describes how to set up version 4.8 from April 2022
17%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
as sources of supplementary information, as well. GitHub offers a suitable browser application, the MITRE ATT&CK Navigator [4], which lets you interactively browse, filter, and highlight data in the ICS matrix
17%
Configure Entra ID with PowerShell Desired State Configuration
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Tom Hermans on Unsplash
a MOF file from it, then upload it to the DSC system for local execution (Figure 4). Figure 4: One computer is responsible for constantly checking
17%
Manage user accounts with MS Entra lifecycle workflows
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Aliaksandr Marko, 123RF.com
tasks, you can add your own. A Logic App helps you do so, offering virtually any option you could imagine to help manage the infrastructure (Figure 4). When you add Custom extensions , you can either

« Previous 1 ... 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice