Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 48 Next »

67%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
data) Data that is usually considered personal information in Germany, such as driver's license and passport numbers. Israel: PII data Information that is normally considered
67%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
, the choices were Ubuntu's metal as a service (generically, MaaS, but MAAS when referring to Ubuntu's implementation) [2], Juju [3], and Autopilot [4]. With this tool mix, even newcomers can quickly establish
67%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
in solving encryption issues. In true DevOps fashion, I fire up Endlessh with a Docker container: $ git clone https://github.com/skeeto/endlessh If you look at the Dockerfile within the repository, you can
67%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
. The attachment can then be examined and analyzed before it finds its way to the recipient. Of course, automated systems must have allowlists, but normal users in your company and their counterparts can usually
67%
Office 365 vs. Google Apps
19.01.2012
Home »  Articles  » 
 
contacts and then chat with the contacts or make audio or video calls. To use all of Lync Online’s features, you will need the Lync Client (Figure 3), which is currently only available for Windows
67%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
a processor with several cores and a normal clock speed. Therefore, more cores are not always significantly faster than fewer cores. Above all, Hyper-V performance benefits from clock speed, because
67%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
thus automatically chooses the 1,024x768 resolution as the best common option between the two display devices [1]. Because the external monitor typically uses a 16:10 aspect ratio as a normal office
67%
Highly available Hyper-V in Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Andrea Danti, 123RF.com
) hosted on that cluster node. Normally, a failover of cluster resources to another cluster node takes place. In Windows Server 2016, Microsoft has introduced two new cluster modes. The first, cluster
67%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
. The client opens a connection to TCP port 443 on the server. 2. The client sends an "SSL Session Setup Message" to indicate that it wants to set up an SSL connection to the server. 3. The server sends an SSL
67%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
is near-field communication (NFC) cards, which operate in the frequency range of 13.56MHz and achieve ranges of around 50cm. Finally, ultrahigh frequency (UHF) systems normally reside in the frequency range

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice