Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 95 Next »

7%
Puppet Bolt orchestration tool
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by lee junda on Unsplash
is a matter of a few simple commands: wget https://apt.puppet.com/puppet-tools-release-bullseye.deb sudo dpkg -i puppet-tools-release-bullseye.deb sudo apt-get update sudo apt-get install puppet-bolt To run
7%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
on the Linux-based WHM/cPanel offering [1]. Getting Started Although cPanel can be licensed directly from cPanel Inc., most hosting providers get it from their ISP as an add-on to their dedicated host; I make
7%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
releases. We were moving. That’s how you drive feature function, then you do more feature function and work on performance stability. Once you get the core functionality in place, it’s about feature tuning
7%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
No a8f5898e-1dc8-49a9-9878-85004b8a61e6 Blocks Win32 API calls from Office macros No 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b Deploys advanced protection against ransomware
7%
Save money with Samba as the domain controller on a legacy Windows NT-style domain
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Bernad, fotolia.com
privileges. This means domain administrators must assign themselves this privilege. Listing 6 shows how a domain administrator would go about this. Listing 6 Assigning Privileges root
7%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
Authorization escalation WMI and WinRM remoting modifications Malicious code generation After cloning the repository into a local directory, subdirectories are available for the various objectives
7%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
building large VPNs. Luckily, all DMVPN components have been open sourced. In this article, I show you how to set up a DMVPN with the VyOS Linux router distribution, which also can be used to improve
7%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
fork (Figure 1). Figure 1: Video, chat, notes, tasks: Grommunio's original name derives from the claim "groupware and much, much more." © grommunio.com
7%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
of “fat” to cut out of a chip design that would benefit all scientific applications. We get an extra boost by targeting climate, but just targeting scientific computing is a big win in terms of energy
7%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
expand the command set or provide more secure alternatives for standard procedures, such as SSH as an alternative to Windows Remote Management (WinRM) remote maintenance. Even malware scanners

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice