Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1118)
  • Article (313)
  • News (201)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 157 158 159 160 161 162 163 164

9%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
relaying party you still have to maintain is the one between ADFS and Azure AD (shown in Figure 6 as a light green connection). Figure 6: Azure Active
9%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
are documented in the .zip file format specification. Also, starting in version 6.2 of the ZIP format, file name encryption was introduced so that metadata was encrypted in what is called the “Central Directory
9%
Windows 10 Updates with WSUS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © sensay, 123RF.com
Offline Update [6] freeware tool helps with this process (Figure 4). The tool automatically downloads the WSUS catalog file from Microsoft and then all the patches that you selected. You don't have
9%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
advanced configurations such as multiple network interfaces on a single VM, custom routing, and the use of both public and private IP addresses. Additionally, Azure's support for IPv6 and its API offerings
9%
Designing a secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
(PAM) trust [6] to the Red Forest. You might also want to consider the use of smart cards for Red Forest logins and use shadow principals to assign principals from the Red Forest permissions in a Golden

« Previous 1 ... 157 158 159 160 161 162 163 164

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice