Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (257)
  • Article (6)
  • News (5)
Keywords

« Previous 1 ... 20 21 22 23 24 25 26 27

17%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
Labs [6]. This variant is of most interest to corporations who already have accounts with these providers and use their spam and virus filters. If you're not a customer of one of these services but do
17%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
, visit the project website or attend the annual Bacula conference, which is being held along with the Bacula developer conference this year [6]. Additionally, Open Source Press intends to release a Bacula
17%
Windows Performance Toolkit and System State Analyzer
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ewa Walicka, fotolia.com
(WSSA) belongs to the Software Certification Toolkit and is available in 32-bit and 64-bit versions [6] [7]. Before you can use the tool for test purposes, you first need to create a snapshot; then you
17%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
17%
Server virtualization with VirtualBox
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Federico Caputo, 123RF.com
. To set up mod_ssl, check out the Ubuntu Server Guide [6]; otherwise, you can secure the connection to the web server with some other encryption technology, such as over a VPN. In this case, you should
17%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
(PAM) trust [6] to the Red Forest. You might also want to consider the use of smart cards for Red Forest logins and use shadow principals to assign principals from the Red Forest permissions in a Golden
17%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
/3 weight 409600bit allot 1514b level 0 ewma 5 avpkt 920b maxidle 1.6ms Sent 185501283289 bytes 158312905 pkt (dropped 1492, overlimits 451813147 requeues 0) rate 0bit 0pps backlog 0b 0p requeues 0
17%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10

« Previous 1 ... 20 21 22 23 24 25 26 27

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice