Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1329)
  • Article (336)
  • News (251)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 174 175 176 177 178 179 180 181 182 183 184 185 186 187 ... 192 Next »

9%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
/containers/bullseye-1 https://debian.inf.tu-dresden.de/debian/ To log in to the container as root, pts/0 must be in /etc/securetty: echo "pts/0" >> /mnt/containers/bullseye-1/etc/securetty If you now want to start
9%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
virtualization extensions, extended page tables, and a Windows hypervisor. Secure boot Trusted Platform Module (TPM) 2.0 (recommended) Unified Extensible Firmware Interface (UEFI) lock (recommended
9%
An overview of VMware tools
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Giuseppe Ramos, 123RF.com
produce additional instances of the application when needed. For the first time, the new version 5.0 of vFabric Director is no longer limited to Linux and now also allows Windows configuration, including
9%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
. It is available in Kali Linux, for example. An example of a query for an SRV record and its output could look like: dig _ldap._tcp.jooslab.de SRV _ldap._tcp.jooslab.de. 3600 IN SRV 0 100 389 dc1.jooslab.de _ldap
9%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
to another. Additionally, a lot of development and testing of the upgrade scripts (which update data files when such updating is required) has made it easier to upgrade from MySQL 5.0 to MariaDB 5.1 than from
9%
PowerShell for Exchange and SharePoint
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Olexandr Moroz, 123RF.com
the SPModule.misc and SPModule.setup folders directly into the C:\Windows\System32\WindowsPowershell\v1.0\Modules directory. This is the path where the other PowerShell modules reside. If you want to reserve
9%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
350 -gravity center crop 480x320+0+0+repage standardphotos/$i; done MobaXterm's core functionality is its Cygwin compatibility layer, which also contains a port from the original XOrg server
9%
Bundle your custom apps in a Debian package
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Cathy Yeulet, 123RF.com
/www/index.html. Listing 1 Control Files Package: myserver Version: 0.0.1 Section: server Priority: optional Architecture: all Essential: no Installed-Size: 1024 Maintainer: Dan Frost [dan@3ev.com] Description: My
9%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
, reduce the size of the swap file for drive C: to 0. Click on Set to store the changes, close any open windows, and reboot your server. On a core server, the best approach to moving the swap file
9%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
to include user-mode executables in the scan, the 0 Enabled: UMCI rule option is automatically added to the WDAC policy. In the future, WDAC then scans user-mode executables and scripts. You also have

« Previous 1 ... 174 175 176 177 178 179 180 181 182 183 184 185 186 187 ... 192 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice