Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1321)
  • Article (314)
  • News (201)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 145 146 147 148 149 150 151 152 153 154 155 156 157 158 ... 184 Next »

9%
Five graphical database front ends
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © yewkeo, 123RF.com
Office [6] and OpenOffice [7]. It is not uncommon for Base to end up automatically on your drive when you install these office suites. If not, you can usually install manually from the package sources. When
9%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
website [6], include libpcap , OpenSSL, the BIND8 library, libz , Bash, and Python. Installing from source requires additional dependencies, including Swig, Bison, and Flex. I found that each
9%
OpenStack: Shooting star in the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Vladimir Nenov, 123RF.com
OpenStack, Neutron [6] is also modular: The API is extended by a plugin for a specific SDN technology (e.g., the previously mentioned Open vSwitch). Each plugin has a corresponding agent on the computing
9%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
.it domain (Listing 6). Table 1 Sample Policy Action Rule Type Selector Allow Include Emails ending in @vizards.it Listing 6
9%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
also is compatible with IPv4 and IPv6 because it resides one layer below in the OSI reference model. Because MACsec is implemented at a low level close to the hardware, it demonstrates high performance
9%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
the Microsoft site [6]. The tool is used to test connections for Outlook, smartphones, or Office 365. After selecting the desired test, enter the data for the Exchange Server you want to test and the user data
9%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
M 12345 5 36 F 12346 6 34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
9%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
(6192 bits), 774 bytes captured (6192 bits) Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:6f:7g:8h:9i:0j Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104 User Datagram Protocol, Src Port
9%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
Warp has an anti-virus solution based on the Kaspersky engine (Figure 6). Microsoft offers built-in anti-virus protection as of Exchange Server 2013. Figure 6
9%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
, simple bars, or histograms. Conky normally writes its output directly to the desktop – more specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate

« Previous 1 ... 145 146 147 148 149 150 151 152 153 154 155 156 157 158 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice