Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 156 157 158 159 160 161 162 163 164 165 166 167 168 169 ... 183 Next »

13%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
now. With that need in mind, the email vendor Tuta [3] just rolled out a new version of their Tuta Mail product (Figure 1) that features quantum-resistant encryption, becoming one of the first
13%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
: 3 selector: matchLabels: app: my-app template: metadata: labels: app: my-app spec: containers: - name: my-app image: my-org/my-app:1
13%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
] Group policy settings for Windows Server 2022 [3] Windows Server 2022 comes with 47 new policy settings, for a total of 4,442 policies. More key data include: 39 new policies for the computer
13%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
, are quite moderate: All server systems as of Windows Server 2008 are supported. AADSync only needs .NET Framework Version 4.5 and PowerShell 3. Installation in Four Steps The installation comprises four
13%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
in a business-friendly manner and Max Schrems [3] having to remind the European Court of Justice (CJEU) of the applicable law. Here, too, the remedy is a lengthy process because an entire ecosystem is built
13%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
to CloudFlare CEO Matthew Prince, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS
13%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
and Windows Server 8 use the new PowerShell 3.0 that I’ll cover in a later entry. Starting and Stopping Services One of the basic duties of an Administrator is to start, stop, and restart services on systems
13%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
. It is used by all the parties (i.e., the mobile node, correspondent node, and home agent) in messages that have to do with the management and updating of bindings. Figure 3 shows the configuration
13%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
. One of the standard applications that relies on the REST API is Floodlight’s own GUI (Figure 3). Additionally, a Python-based Circuit Pusher automatically installs persistent OpenFlow rules
13%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
-friendly statistics that might be more suited to the less technical minded. Figure 3 shows MRTG Total Traffic Generator with some slightly modified output. Although it hasn’t been maintained since 2002, with only some

« Previous 1 ... 156 157 158 159 160 161 162 163 164 165 166 167 168 169 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice