Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"425 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1189)
  • Article (276)
  • News (120)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 152 153 154 155 156 157 158 159

25%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
receive and analyze the weather data from this source in JSON data format, but a Flutter package named weather [6] for OpenWeatherMap simplifies the steps. All you need is an API key, which you can get
25%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
advanced configurations such as multiple network interfaces on a single VM, custom routing, and the use of both public and private IP addresses. Additionally, Azure's support for IPv6 and its API offerings
25%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
/3 weight 409600bit allot 1514b level 0 ewma 5 avpkt 920b maxidle 1.6ms Sent 185501283289 bytes 158312905 pkt (dropped 1492, overlimits 451813147 requeues 0) rate 0bit 0pps backlog 0b 0p requeues 0
25%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10
25%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
(PAM) trust [6] to the Red Forest. You might also want to consider the use of smart cards for Red Forest logins and use shadow principals to assign principals from the Red Forest permissions in a Golden
25%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
the computer. Remember that Microsoft hardened the join process with an existing computer object in 2022 and again in 2023 [6], which limits your design options to some extent. Another measure you should
25%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
in Windows 10 from the German Federal Office for Information Security [5] Center for Internet Security benchmarks [6] US Department of Defense Security Technical Implementation Guide [7] Australian
25%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
management (LDAP/AD), EUR7,000. In some areas, openQRM additionally offers a hardware bundle with preinstalled SuperMicro hardware and installation support. Check out the website [6] for details. Opening

« Previous 1 ... 152 153 154 155 156 157 158 159

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice