Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1295)
  • Article (344)
  • News (221)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 ... 187 Next »

13%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
in the form of a master boot record (MBR) or a GUID partition table (GPT) [3]. The tricks the expert used to revive RAID systems (Figure  1) did not help: Neither fdisk nor mmls – the forensic counterpart from
13%
Monitoring changes in Active Directory with built-in tools
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Tobias Tullius on Unsplash
on the discovery of ransomware, look for the first important or noticeable events. Table 1 gives you a small excerpt, and an article online [3] has more information. Microsoft's link uses a criticality rating from
13%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
updates once only at branch offices also saves network bandwidth. Only Signed Apps Device Guard [3] is a new technology in Windows 10 that aims to prevent malicious software from running on the system
13%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
, certificates, or tokens. In most cases, an API is available for accessing such a service. One well-known representative of these data storage devices is HashiCorp Vault [3]. However, vaults have many problems
13%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
that lets you extract plain text credentials from memory, password hashes from local SAM/NTDS.dit databases, advanced Kerberos features, and more. The Mimikatz codebase is available online [3]. The codebase
13%
Asset tracking with RFID
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Vasiliy-Yakobchuk, 123RF.com
other things, the company provides a whitepaper [3] in which various snippets of information on the structure of the company's own RFID solutions can be found. Of particular interest is a reference
13%
The Aurora Mesos Framework
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Anton Gvozdikov, 123RF.com
of applications. Added to this was the constant rollout of new software versions. Bill Farner had previously worked at Google and had some experience working with Google's Borg cluster manager [3]. In the early
13%
The role of open source in enterprise storage solutions
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Swapnil Bhartiya
Flash, which is a massively scalable flash storage system with half a petabyte of storage in a 3U box. Since Ceph is one of the most popular deployed Cinder implementations, we naturally were drawn into Open
13%
Working with the Exchange Management Shell
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © silvae, 123RF.com
Identity){"$PosIdentity was not found!";Exit 2} ElseIf {(-NOT(validate $PosUser){"$PosUser was not found!";Exit 3} Else{ $ErrorActionPreference="stop"; #Dynamic change begins trap {"Error in the allocation. `n let's try the other
13%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
collection. The EMET user guide and the TechNet websites provide detailed information about distributing EMET using SCCM. Microsoft KB article 816102 [3] provides further information if you want

« Previous 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 ... 187 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice