Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: เว็บบอลสเต็ป2(liทe@rules)เว็บหวยออนไลน์.ikv ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (484)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 58 Next »

32%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
with the arrival of VMware [1], KVM [2], and Hyper-V[3], because virtualization makes it easy to jump-start new computers. New computers nearly always require an IP address and network integration. In the past
32%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
and on whether and how resources may be accessed. An excerpt from the source code illustrates the sequence (Listing 2). Figure 1 schematically represents the communication pathways. Listing 2 Resource
32%
Privileged Identity Management in Azure AD
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © lassedesignen, 123RF.com
-eyes or two-man rule). The JIT part of this is that even administrative accounts only have administrator powers if they have been previously enabled and approved. Microsoft refers to this process as "activation
32%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
server and can send and receive email and use instant messaging. Like Exchange, IceWarp supports the use of rules. These can be set on the server side and bound to user email domains or entire groups
32%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
the IT infrastructure, including logfile analysis and intrusion detection [2]. The various ways of using the system include cloud images, which are intended for use in the Amazon, Google, and Azure clouds
32%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
did not reinvent the wheel; rather, they integrated the proven PHP package by SabreDAV [2] (Figure 1), which implements the WebDAV protocol stack as a server. The newly created protocol layer in Kolab
32%
An introduction to FreeNAS
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Mario Lopes, fotolia.com
and resources to keep the FreeNAS project going, so he transferred control of it to iXsystems [2], a company well-known for its support of open source software in general and FreeBSD [3] in particular. A period
32%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
no distinction between human users and service accounts in terms of access controls. © Kubernetes [2] Authentication checks whether Kubernetes is able to verify the username with an authentication method
32%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
Perl and PHP and is released under the GPLv2. The project is supported by FactorFX, which offers commercial support and training. One really interesting feature of OCS is its support for SOAP web
32%
Azure Application Gateway load distribution tool
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © foodandmore, 123RF.com
Application Gateway is Microsoft's standard for Layer 7 load balancing and supports the HTTP, HTTPS, and HTTP/2 protocols. However, the provider also advertises AAG as an application delivery controller

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice