Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e100】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 216 Next »

42%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
whose addresses are then scanned to find open ports and thus identify services running on them. SNMP queries also provide detailed information about components and status, especially for networks
42%
Secure Alternative to FTP
23.07.2013
Home »  Articles  » 
 
sharing or collaboration. Whereas individuals often use free Google tools or cloud services, such as Dropbox, Duplicati, and others, companies prefer more secure services and technologies alongside
42%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
tools, in case you happen to be searching for your own IPsec solution. Configuration Steps for IKE An IPsec connection can run in tunnel mode (multiple LANs are connected with gateways that encrypt
42%
Office 365 vs. Google Apps
19.01.2012
Home »  Articles  » 
 
or any other user with corresponding authorization can easily modify the website design to reflect their corporate look. Google Apps Overview Google Apps for enterprises  was introduced four years ago ... Office 365 vs. Google Apps ... Office 365 vs. Google Apps
42%
Zentyal Server 3.5
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © PozitivStudija, fotolia.com
's web-based interface, you can get your server configuration up and running in almost no time. On the Hard Disk The Zentyal server, which originated in Spain, has been around for many years
42%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
mentioned here, it is part of the audit package that should be included in the software repository of your choice of Linux distribution. auditd running in userspace is notified about events that occur via
42%
iSCSI: Set up and use LIO targets
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Volodymyr Krasyuk, 123RF.com
are available on GitHub (Figure 1). Figure 1: Pick up the sources for configshell, rtslib, and targetcli on GitHub. The next step is to run the make rpm
42%
Testing the Samsung MU-PA500B 500GB SSD
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Lucy Baldwin, 123RF.com
the drive will provide under a high write load. Figure 2: Gnome Disks benchmark (1,000 10MiB samples) running on the Samsung T5. Note the garbage collection
42%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
drive. A virtual machine that boots from the CD image lets you check out the backup system on a running system. What Redo Backup Can Do … Redo Backup combines the advantages of a reliable operating
42%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
Hardening by ACSC The Australian Centers for Cyber Security (ACSC) works with LowPrio , MediumPrio , and HighPrio ratings. The website has recently been rebuilt, and you cannot currently download a ready-to-run

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice