Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (317)
  • Article (80)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 43 Next »

6%
Cooperation with Cyn.in
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Jo Coenen - Studio Dries 2.6 on Unsplash
.in creates a site administrator (the login is siteadmin /secret ). Each Cyn.in account has its own profile, for which you want to change the passwords. You can add to the profile in Personal Preferences
6%
Open source calendar synchronization
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by jason hafso on Unsplash
on the profile picture top right, and select Apps from the drop-down menu. Then locate the Calendar app and enable it. A calendar icon now should appear in the top pane of all Nextcloud accounts. You can go
6%
Apache OpenMeetings video conferencing platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Chris Montgomery on Unsplash
maintain their profiles, including photos, on the dashboard and change their passwords at any time. As a result, AOM also provides a good basis for teams that want to maintain their own user data. Open
6%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
plug-in finds the operating system to which the memory dump belongs. In Figure 9, the suggested profile portion of the output shows a WinXP SP2x86 system; you will need this information to perform more
6%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
for a network. In the above model, the Discovery stage involves reconnaissance. In Discovery, attackers do more than simply identify network hosts; they also identify and begin profiling individual users
6%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
accounts and issue VPN profiles and soft tokens to your end users. VPN User Accounts and Soft Tokens Creating a new VPN user account and soft token is really easy. Under Users | Add User , complete
6%
Agile system management in large-scale environments with Func
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
bowie15, 123RF
/log/func/ Automating Installation with Cobbler If you want to automate the process of installing Func on all your systems, you can use Cobbler [3] kickstart profiles. The Cobbler configuration file has two separate
6%
Two-factor authentication for WordPress blogs
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Les Cunliffe, 123RF.com
in the WordPress plugins settings under Settings | YubiKey . On the Users | Your Profile page, enter the key ID, which is the first 12 characters that YubiKey automatically outputs. Now, switch Yubi
6%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
, in the first article I wrote about Environment Modules, I said to copy the modules.bash and modules.sh files to the directory /etc/profile.d . However, to limit the ability of an ordinary user to bypass
6%
Open source tools for workgroup collaboration
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Setsiri Silapasuwanchai, 123RF.com
with firewalls, although you can enable an optional firewall mode. After you install RetroShare, create a new profile in the client; you'll need to specify the services you wish to use and the matching passwords

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice