Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 70 Next »

24%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
Some would make the case that Perl is the most used and most capable scripting language on the Internet today, and this is probably true. Its versatility and ease of use has made it an industry ... Perl sockets work like file handles that can span across a network or the entire Internet. ... Internet socket programming in Perl
24%
Citrix XenServer 6.2 goes open source
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © George Tsartsianidis, 123RF.com
familiar features found in competitive products at a very attractive price. Infos Release Notes for XenServer 6.2.0: http://support.citrix.com/article/CTX137826 Tech preview of Xen ... Open Source XenServer 6.2 ... Citrix XenServer 6.2 goes open source
24%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
) win 512 9a:d7:d9:6a:fd:ee 9b:e8:7:15:e4:1d 0.0.0.0.44381 > 0.0.0.0.7072: S 352131538:352131538(0) win 512 42:33:77:69:9b:65 ef:3b:4c:19:e2:bd 0.0.0.0.24920 > 0.0.0.0.19837: S 1039619585:1039619585(0 ... Understanding Layer 2 switch port security
23%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in particular – to identify their attack surfaces more precisely and respond more quickly to changes in their risk situation (see the "Prevention and NIS2" box). In their Leadership Compass publications on ASM [1 ... The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.
23%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
level of TCP streams and UDP datagrams) and 7 (HTTP/application protocols) can be configured comprehensively, whereas the underlying Layer 2 and Layer 3 network (frames and IP packet layers) cannot. Who ... Mesh Service for OSI Layers 2 and 3
23%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
, the answer to the Common Name prompt is login.example.com (Figure 2). Keep the certificate, the private key, and the passphrase somewhere safe; better yet, memorize the passphrase ... To spoil the day for lurking data thieves, Apache administrators only need three additional directives – and a handful of commands. ... Setting up SSL connections on Apache 2
23%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
Time and again, situations arise in which admins need access to a system they do not otherwise manage. But, do you want to hand over responsibility for password management to a centralized software ... administrator is not available. In Case of Emergency The classic solution to this problem is a list of passwords in a sealed envelope that is deposited in a vault and handed over when an emergency occurs ... Time and again, situations arise in which admins need access to a system they do not otherwise manage. But, do you want to hand over responsibility for password management to a centralized software
21%
Cluster-Aware Updating for Windows Server 2012 R2
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © bahri altay, 123RF.com
can only be used with Hyper-V; you cannot automatically update other cluster services with SCVMM. CAU, on the other hand, supports all cluster roles in Windows Server 2012 (R2), including Hyper-V. Only ... Cluster-Aware Updating for Windows Server 2012 R2
21%
Microsoft System Center Virtual Machine Manager 2008 R2
14.07.2011
Home »  CloudAge  »  Articles  » 
 
Shell 1.0 or 2.0, Windows Remote Management (WinRM) 1.1 or 2.0, and the .NET framework 3.0 (SP1). The webbased SCVMM SelfService Portal additionally requires Internet Information Server (IIS) version 7.0 ... Microsoft System Center Virtual Machine Manager 2008 R2
20%
Monitoring with System Center 2012 R2 Operations Manager
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © dotshock, 123RF.com
System Center Management Pack for Windows Server 2012 R2 Hyper-V: https://www.microsoft.com/en-sg/download/details.aspx?id=36438 System Center 2012 R2 UR3 releases with new Operations Manager updates ... Monitoring with System Center 2012 R2 Operations Manager

« Previous 1 2 3 4 5 6 7 8 9 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice