Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (187)
  • Article (79)
  • News (10)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next »

44%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, they convert arbitrary input to fixed length output. The output is typically a hex number: for example, the MD5 hash of the word “Hello” is 8b1a9953c4611296a827abf8c47804d7. To be secure, a cryptographic hash ... SHA-3 – The New Hash Standard
44%
Secure Alternative to FTP
23.07.2013
Home »  Articles  » 
 
(SFTP). A new addition was made in 2008, Managed File Transfer (MFT), in which all files to be transferred are encrypted not only en route but also during storage on the server or on share points. Core
44%
Windows Server 2012 Administration
07.06.2012
Home »  Articles  » 
 
settings, manage IIS, manage storage, check events, add roles, add features, and much more. Figure 3: Server Manager’s default view, ready to manage your
44%
Monitoring changes in Active Directory with built-in tools
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Tobias Tullius on Unsplash
Baseline\GPOs\{E2B8214C-729F-4324-A876-F067E58B740B}\DomainSysvol\GPO\Machine\microsoft\windows nt\Audit\audit.csv). The windows nt folder name is not a typo; it just shows you the historical origins
44%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
on collecting large volumes of data; (3) Strelka [9] scans content and prepares it for detailed analysis; (4) Zeek [10] is dedicated to monitoring and analyzing large volumes of data and can limit the data volume
44%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
(SFTP). A new addition was made in 2008, Managed File Transfer (MFT), in which all files to be transferred are encrypted not only en route but also during storage on the server or on share points. Core
44%
Windows Server 2012 Tricks
27.05.2013
Home »  Articles  » 
 
. Underneath its new clothes, the new Windows Server variant has treasures to offer, as shown by the following tricks. Trick 1: Efficient Use of Server Manager Windows Server 2008 R2 in part already allowed
44%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
quite a solid financial basis. Up until 2008, the team originating from Bulgaria and the United States developed a replica of Exchange that ran on Linux. Cisco then whipped out its wallet and acquired
44%
The 12 best tricks for Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Graphic Designer, Fotolia.com
. Underneath its new clothes, the new Windows Server variant has treasures to offer, as shown by the following tricks. Trick 1 Efficient Use of Server Manager Windows Server 2008 R2 in part already allowed
43%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
] Group policy settings for Windows Server 2022 [3] Windows Server 2022 comes with 47 new policy settings, for a total of 4,442 policies. More key data include: 39 new policies for the computer

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice