Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub"22%2000 Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (259)
  • News (38)
  • Article (32)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 Next »

35%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
from systems such as the IIS, Microsoft Exchange ActiveSync, Exchange Web Services (EWS), or Outlook Web Access (OWA). Installation under .NET .NET Framework 4.x and Log Parser 2.2 [2] form the basis
35%
Up close with SUSE Linux Enterprise 12
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © kasza, 123RF.com
already know: SUSE decided to completely rewrite YaST in 2013. The old version was written in a proprietary language, YCP (YaST Control or Programming language), that aggravated many YaST developers [4
35%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77 22} 13 $s_anchor_tag = "s_uri = /\(http.+\)/ ascii" 15 16 condition: 17 $pdf_magic at 0 and (#s
35%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
, and activities. Outlook online and Outlook as of version 2013 directly show you notices relating to rule violations (Figure 5). On the one hand, you get to see the unauthorized recipient, and on the other, you can
35%
Setting up Google Apps for Work
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Galina Peshkova, 123RF.com
Server 2003 to 2013, and Office 365. Select IMAP server for accounts for which Google doesn't offer a specific migration agent. You don't need an additional client on the source system with all sources
35%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
, so, in practical terms, a DHCP server is still required for larger networks. RFC 3315 [1], which appeared in July 2013, defines the DHCPv6 protocol. As you can imagine, the long IPv6 addresses
35%
Established container solutions in Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © dixiland, Photocase.com
successfully, in most cases. FreeBSD Jails The prime example is jails in FreeBSD (Figure 1). They became part of the package in FreeBSD 4 (2000), prompted by Derrick T. Woolworth, who was looking
35%
Automated compliance testing with InSpec
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Gunnar Pippel, 123RF
for RHEL, Ubuntu, Mac OS, and Windows in the form of finished packages that install InSpec on your system. The command in Ubuntu is: curl https://omnitruck.chef.io/install.sh | sudo bash -s -- -P inspec
35%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
Foundation since 2013. It is a scalable open source tool that focuses on real-time analysis of large amounts of data. Whereas Hadoop primarily relies on batch processing, Storm is a distributed, fault
35%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
will be 2.2GB lighter. Figure 1: The download options with the SHA256 checksum to make sure it matches the reported checksum on the site. Be sure

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice