Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 0mb 100 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (109)
  • Article (46)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16

37%
Five graphical database front ends
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © yewkeo, 123RF.com
function for saving queries for later use. Kexi Kexi [3] is an integrated database system that is part of Calligra Suite [8]. In the current 3.1.0 version, Kexi runs independently of KDE's Plasma desktop
37%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
experts recommend enabling PHS – at least as an additional authentication procedure. The frequently cited angst prompted by synchronizing passwords with the cloud is unfounded, because hashing more than 1,000
37%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
!), and requires at least Windows Server 2012 R2 and PowerShell 2.0. Listing 1 shows the first lines of the migration loop. Listing 1 Migration by Script 01 foreach ($Mailbox in (Get-Mailbox)) { 02
37%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
among the integrated development environment (IDE) options available for R, I use RStudio [8]. I downloaded RStudio 0.98.1083 Debian 6+/Ubuntu 10.04+ (32-bit) and ran: sudo dpkg -i rstudio-0.98.1083-i386
37%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
(KafkaProducerString, producer = new KafkaProducer(props)) { 03 04 for (long i =**0; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
37%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
and lets you know of changes or foul play on the data link layer. P0f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
37%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
sessions with Google Authenticator [17]. The Google Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator

« Previous 1 ... 9 10 11 12 13 14 15 16

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice