Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (266)
  • Article (80)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 38 Next »

6%
A decentralized communication platform
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Mipan, Fotolia.com
, but you do not have to identify yourself to the service with an email address or a phone number. In the following dialog, Jami prompts you to enter a profile name. You can upload a photo or take one
6%
Finding Your Way Around a GPU-Accelerated Cloud Environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
-accelerated hashing benchmark. Version 6 supplies a CUDA driver and can be found on the developer's website. Launching the nightmare workload profile will keep the GPU busy for some time, giving you a few minutes
6%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
applications for access to corporate data and also prevent the copying of corporate data to untrusted devices, depending on the security profile. Windows Server will enable this functionality through the use
6%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
.0.0.0/0 45 - IpProtocol: udp 46 FromPort: 0 47 ToPort: 65535 48 CidrIp: 0.0.0.0/0 49 VpcId: 50 Ref: FortiVPC 51 52 InstanceProfile: 53 Properties: 54
6%
Identity Management from the cloud
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Timothy Ah Koy on Unsplash
of users in cloud services, their deprovisioning, and managing permissions. Above all, it requires precise control over which users have which authorizations. For example, groups, roles, or profiles
6%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
profile that installs the full set of Istio services and some third-party monitoring apps, including Jaeger, Grafana, Prometheus, and Kiali. After installing the Custom Resource Definitions into your
6%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
, set the level of security that EMET should apply to the system in the ribbon bar in the EMET management console. Click in the drop-down box below Quick Profile Name and select the desired level
6%
Landscape
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
using tags so that all monitoring functions can be applied to arbitrary subsets. In the same way, the admin can create group-specific profiles so that the servers receive, or do not receive, different
6%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
user with a vSphere client and select the Configuration tab (Figure 1). In the Software pane on the left, select the Security Profile link. You can enable the SSH service here. To do this, click
6%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
. The developers therefore explicitly recommend purchasing new hardware for the security suite and offer their own appliances for customized application profiles in a web store. Getting started with the system

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice