Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (272)
  • News (4)
  • Article (3)
Keywords

« Previous 1 ... 20 21 22 23 24 25 26 27 28 Next »

18%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
your own custom versions of Apache and PHP to suit your environment (look for EasyApache) or update the system packages. Here, you can even update WHM and cPanel (see Figure 3
18%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
.com/?locale=de-DE and no page was returned. 3306/tcp open tcpwrapped Finished scripts for a wide variety of applications and protocols are already available and grouped into categories in the online archives of Nmap [3
18%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
(GSA) is expected to release instructions for the compliance auditing process by February 8. According to CIO.gov, the FedRAMP security controls align with NIST Special Publication 800-53, Revision 3
18%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
-featured 1/10/40GbE Layer 2 and Layer 3 blade switch is powered by the Force10 operating system (FTOS) and provides increased bandwidth, scalability, performance, and operational simplicity for blades at data
18%
Security compliance with OpenSCAP
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitriy Pchelintsev, 123RF.com
and configured in a secure way. For this type of environment, you will probably want to use the popular security guides or checklist issued by the NSA [3] or the Defense Information Systems Agency (DISA) [4
18%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
Shell 2.0, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
18%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
then select Capture | Stop to stop recording, and Wireshark will display all of the packets it has captured (Figure 3). Figure 3: Launching Wireshark without
18%
Operating system virtualization with OpenVZ
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© sculpies, Fotolia.com
VServer [1], OpenVZ [2], or Virtuozzo [3]. Benefits Hypervisor-based virtualization solutions emulate a complete hardware layer for the guest system. Ideally, any operating system including applications
18%
Active Directory overview
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Maksym Yemelyanov, 123RF.com
, which in turn are transitively linked [3]. Active Directory uses the DNS system's defined namespace for domain naming. Within the domain, organizational units (OUs) exist – container objects for grouping
18%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
the hosting version, which is mainly intended for providers, you can choose the server or advanced server versions. The community version [3] is similar to the server version and has no restrictions

« Previous 1 ... 20 21 22 23 24 25 26 27 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice