Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 166 167 168 169 170 171 172 173 174 175 176 177 178 179 ... 208 Next »

12%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
using Entra ID or a hybrid Active Directory, it makes sense to follow the security suggestions. Some of the comprehensive documents provide step-by-step instructions that you only need to implement
12%
Legal or litigation hold and eDiscovery in Microsoft Teams
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Robert Wilson, 123RF.com
not be discoverable now inadvertently becomes discoverable because the "shared" resources are included in the litigation hold. Summary Microsoft 365 provides a comprehensive suite of tools and features to support
12%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
could use some of the OpenSSH service's own configuration options to do this. However, this behavior was deliberately changed in recent versions of the software without providing an alternative approach
12%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
). Figure 5: Statistical values for the number of finds, the number of files searched, the time required, and more are provided by the --stats option. If you want to have a little more context than
12%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
. The practical implementation is discussed using the Leibniz data center (LRZ) as an example. The LRZ is the central IT service provider for Munich universities and colleges; it provides services to approximately
12%
The simpler alternative to cron: Whenjobs
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© stillfx, 133RF.com
. Also, users can program their own expressions in Ocaml. More information about this is available in the detailed man page provided by the tool. Mature Whenjobs was developed as a solo project by Jones
12%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
virtualization environments face. Once the basic installation is in place, it's time to tweak: How can cloud providers add value to their software? How can you future-proof the installation? How can you best
12%
Angular 2 client-side TypeScript framework
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
, before changing to that directory and installing quickstart using the npm [4] node package manager. The quickstart module provides a working, but quite rudimentary, Angular 2 application out of the box
12%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
-V, and of course KVM/libvirt. The virtual systems created in this manner provide a preconfigured environment that is used to operate containers. Vagrant offers a pure Kubernetes environment, as well
12%
ID Views smooth migration to a new identity management system
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Nigel Silcock, Fotolia.com
server. If you want to try other techniques of providing users access to Linux resources from AD, then you might want to try using different IDs for each account. For example, the FreeIPA identity

« Previous 1 ... 166 167 168 169 170 171 172 173 174 175 176 177 178 179 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice