Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (281)
  • News (9)
  • Article (8)
Keywords

« Previous 1 ... 23 24 25 26 27 28 29 30

9%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
properly. An existing backup script can be extended to include heartbeat in a curl command: curl --request POST --header 'Authorization: Key H0i_bj<...>' --header 'Content-type: application/json' --data
9%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
features only found their way into the software in AAP 2.0. Table 1 Ansible Automation Platform Objective To create, execute, and manage automation processes Manufacturer
9%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
.g., A becomes 4, E becomes 3, O becomes 0, 1 becomes !, etc.), makes the password even more complicated and does not make it any easier to handle. For example, the Robbie Williams refrain Hell is gone and heaven
9%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
to separate IP addresses in its configuration. That means you need to define a different separator – the new separator follows the option with the angled brackets: hostlist relay_from_hosts = <; 85.214.7.0
9%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.0 is released. After evaluating several systems, Mlmmj
9%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
a commandlet DLL. To do so, pop up a text window and navigate to C:\Windows\Microsoft.NET\Framework64\v2.0.50727. If you use a 32-bit system, you need to change directory to C
9%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
admin groups necessary, if you have not already done so. No normal user needs to be able to list administrators, highly privileged groups, and Tier 0 systems. Also, consider the permissions of the Admin
9%
Active Directory overview
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Maksym Yemelyanov, 123RF.com
was dominated by Novell NetWare, mainframe solutions, and Unix systems in part. Although Windows theoretically had everything it needed for deployment as a server operating system when NT 4.0 was introduced

« Previous 1 ... 23 24 25 26 27 28 29 30

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice