Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (51)
Keywords

« Previous 1 2 3 4 5 6 Next »

84%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
"-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN" 04 "http://java.sun.com/dtd/web-app_2_3.dtd"> 05 06 07 08
84%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
://kerneltrap.org/node/4785 iknowthis – System call fuzzer: http://code.google.com/p/iknowthis full-nelson.c: http://seclists.org/fulldisclosure/2010/Dec/85 Linux Kernel mailing list: https://lkml.org/ Smash ... 3
84%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
also frequently provides the underpinnings for a virtualization cluster that runs multiple guests in a high-availability environment, thanks to Open Source tools such as Heartbeat [2] and Pacemaker [3
84%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
with its updated ruleset. Installing Tactical RMM Working as the admin user, type su - tactical wget https://raw.githubusercontent.com/amidaware/tacticalrmm/master/install.sh chmod +x install.sh ./install
83%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
). Figure 3: In this case, the developers can invest their capacity helping deployment, where the problem is. The situation gets worse when the other development team finishes Project C (Figure 4
83%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
with different feature scopes. Additionally, Igel offers the Universal Desktop Converter, which converts normal desktops into thin clients. Besides the different hardware, you can also choose from three different
83%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
messages, one of which had an attachment. Figure 3 shows the directory structure in the storage directory after running the script. Figure 3: Directory
83%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
). The context ID relates to the context, all contexts, created using createcontext; this is normally 1. Listing 2 Creating Users 01 sudo /opt/open-xchange/sbin/createuser -c 1 -A oxadmin -P Admin
82%
PowerShell for Exchange and SharePoint
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Olexandr Moroz, 123RF.com
for the user@contoso.com mail account, enter the command: get-mailbox user@contoso.com |fl display name, database, alias, organizationalunit Cmdlets are not case sensitive. If you run a wizard in the Exchange
82%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
. Figure 3: Normally, a regular router responds to the request by sending an RA. Rogue Routers If a rogue router is active and sends an RA to the multicast group FF02::1 (Figure 4), the network

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice