Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (315)
  • Article (8)
  • News (8)
Keywords

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 Next »

18%
Centrally manage configuration files
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by The New York Public Library on Unsplash
, the Ansible documentation [3] is a good place to start. Infos XDG base directory specification: https://specifications.freedesktop.org/basedir-spec/latest/ Stow: https
18%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
Certificate Services (AD CS; Microsoft's implementation of an enterprise PKI). The first systematic discussion of AD CS vulnerabilities that lead to the compromise of AD DS is mentioned in an article [3
18%
FreePBX phone system
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Lofik, Fotolia.com
topics such as a digital fax that is based on HylaFAX [3]. To this day, faxing is still necessary in some countries because it is still the only legally binding form of communication besides snail mail
18%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
. Modules and Prices The developers sell the device, which is made in China, from their online store [3]. The price for the basic device is $169 (EUR199). Purchasing a silicone case ($15, EUR18) is also
18%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
need to specify the command with the desired sub-command, for which you can again get help. Typing set address ? takes you to a detailed syntax description (as shown in Figure 3). Thankfully
18%
Monitoring with Zabbix
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Les Cunliffe, 123RF.com
(Figure 3) expects an intuitive name. When you choose it, remember that the name will also be the subject line for the email sent when the trigger is tripped, as in, "Ping failed – host unreachable
18%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this, the topic is still largely overlooked and a huge amount
18%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
your own custom versions of Apache and PHP to suit your environment (look for EasyApache) or update the system packages. Here, you can even update WHM and cPanel (see Figure 3
18%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
. This scan uses a series of plugins specifically designed to detect vulnerabilities in AD systems (Figure 3). Any vulnerabilities found are visualized in the Tenable Vulnerability Management dashboard to help
18%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
. Red Hat is trying to tackle the problem with Automation Hub (Figure  3), which collects integrations for a wide range of applications directly in Ansible. In practical terms, it is a kind of Ansible

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice