Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (262)
  • Article (79)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 38 Next »

6%
Mobile device management with Microsoft System Center 2012 R2
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © konstantynov, 123RF.com
Devices After installing the Intune Connector, you now have the matching extensions in the SCCM management console. They include support for Windows Phone 8.1, Apple iOS security setting, and email profile
6%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
of programming models, it may well be necessary, depending on the application profile, to consider a compiler alternative. Depending on the platform, the LRZ offers one or two such alternatives on its HPC systems
6%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
actions. The process of reassessment is continuous and generates risk profiles that support the administrator in evaluating, researching, and conducting forensics. The decisive factor is the detection
6%
Open source customer relationship management software
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Martina Berg, Fotolia.com
CRM instances. The tools for customizing SuiteCRM are accessed from the Profile selection under the user menu. The Administrator control panel provides a vast range of functionality for configuring Suite
6%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
right-hand corner of the window, you will find options for modifying your user profile, logging off, discovering new features, or modifying the software's basic settings. These settings include
6%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
on the network. You can create logical switches in SCVMM vNext and assign these switches to servers with Windows Server vNext. You can also use profiles and classifications. However, only the bandwidth settings
6%
Tuning ZFS for Speed on Linux
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Wong Yu Liang, 123RF.com
into cache, is very high because of the nature of randomized read I/O profiles and operations. The amount of memory the ARC can use on your local system can be managed in multiple ways. For instance, if you
6%
Monitor your network
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Endrille, Fotolia
is a multi-tenant service that can be accessed by multiple users with different profiles. Roll Out the Server While you can deploy Pandora FMS on all kinds of operating systems, including Windows, Linux
6%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
_path": "/var/log/osquery", 07 "disable_logging": "false", 08 "schedule_splay_percent": 10 09 }, 10 "schedule": { 11 "osquery_profile": { 12 "query": "SELECT * FROM osquery_info;", 13
6%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
multiple people to go to the compromised website. In this article, I profile a persistent XSS attack. Reflected: Malicious input originates from the victim's request, which means the victim has either

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice