Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 179 180 181 182 183 184 185 186 187 188 189 Next »

9%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
the RTP packets or use SRTP (Secure Real-time Transport Protocol) for secure encryption in the Internet-bound direction. The same results are also possible with a local Asterisk installation [5]. More
9%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
kind of groupware (e.g., Microsoft Exchange, Axigen [5], etc.). Journaling accounts, or accounts with elevated privileges, are typically required to copy all email to the archiving software
9%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
dependencies. RVM [5] offers a solution for this complex interplay of Ruby interpreters, versions, and Gems, by helping developers maintain project-based environments. Installation The standard installation
9%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
to a report. Also, you can trigger both backup and recovery actions remotely. The detailed and well-written Tactical RMM documentation [5] provides a detailed overview. It would go well beyond the scope
9%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
.e., the interface) of the software must follow modern style guides and be responsive when a website is provided. The open source KeePassXC [5] is one of the best-known tools in the password manager world
9%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
in a single pod and only shares one HTTP port with the outside world. The upstream Nginx reverse proxy takes care of SSL termination. In principle, you just need to convert the Docker Compose file [5] provided
9%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
distributions for Puppet [4]. Organizations can also choose to purchase a premium module such as sce_linux [5]. Toward Intentional Infrastructure Puppet's strength lies not just in automation
9%
Modern network diagnostics
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Paul Aniszewski, 123RF.com
that the system is running an outdated version of Windows or that PowerShell is not properly configured. In such cases, ensure that PowerShell 5.0 or later is installed and running. Windows updates generally
9%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
RaWAN service [5] maps the function of network and join servers in the cloud (Figure 3) and thus removes the need for LoRaWAN network operators to operate their own network and join servers. This setup allows Lo
9%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
for different security requirements: GnuPG Desktop [3] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies

« Previous 1 ... 179 180 181 182 183 184 185 186 187 188 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice