Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (37)
Keywords

« Previous 1 2 3 4

23%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
CentOS 5 to 6 would work – a procedure the release notes advise against – a virtual environment seemed like the prudent decision. The first step is to create a copy of the current system, which should
23%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
on the Internet, comfortably surpassing the mark of 100 million websites some time ago, so I hope you'll find that these examples are applicable to a multitude of scenarios. Myths and Folklore A common
23%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
with its e-tokens – one reason they were acquired by SafeNet. However, e-token is e-token, whether labeled Aladdin or SafeNet. At a price of around US$ 100, an e-token is basically a USB device containing
23%
Updating Small Business Server 2008
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Petra Wanzki, Fotolia
Connections action is enabled. To enable the rule on the clients, enter gpupdate /force or reboot. Forefront for Exchange 10.0 with SP2 Rollup 2 During the SBS 2008 installation, you can opt to install a 120
22%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
, 09 'protocol' => 'imap', 10 'port' => 143, 11 // Plaintext logins are disabled by default on 12 // IMAP servers (see RFC 3501 [6.2.3]) 13 'secure' => 'tls', 14 'maildomain
22%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
, and to provide protection against VoIP spam by various means. Additionally, other initiatives are SpITAssassin [6], an extension of SpamAssassin functionality, and the SPIT defense solution (SPIT AL). SPIT AL
22%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10

« Previous 1 2 3 4

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice