Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • News (5)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

27%
Centrally manage configuration files
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by The New York Public Library on Unsplash
is the global Product Lead for Identity Management and Platform Security in Red Hat's Product Operations group. He is a regular speaker at various international conferences and writes a lot about open source
27%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
/type-support-working-with-sudo-logs-in-syslog-ng-4-0 The Author Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product
27%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
Certificate Services (AD CS; Microsoft's implementation of an enterprise PKI). The first systematic discussion of AD CS vulnerabilities that lead to the compromise of AD DS is mentioned in an article [3
27%
Windows updates and patch distribution without WSUS
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Rob Thompson on Unsplash
is essentially a cloud-based service. This setup leads to relatively high bandwidth requirements. If the Windows Delivery Optimization feature [5] is not set up correctly, each client will download its own update
27%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
after the second call. The function call between the write calls does not interfere if its byte area does not overlap the written areas (Figure 5). Any function not overlapping the written areas leads
27%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
in Figure 1. The username required to login to both computers follows -u and the password -p. Figure 1: On the first computer, the login fails, which leads
27%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
2 10:15:51 mail dovecot: deliver (sieve): sieve: msgid=<4E37B272.2060705@ meinefirma.tld>: stored mail into mailbox ' Junk' In the Sieve language, you start by stating the condition, which then leads
27%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
The rapid increase in new cloud services and their popularity will, in future, lead to systems, applications, or accounts being compromised in the cloud. Attackers are always at the leading edge of technology
27%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
or Nabble, besides regular mail delivery, also takes some getting used to. The program doesn't take into consideration the fact that most users will only choose one type, which leads to unintelligible
27%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
because some systems replace these with line breaks during parsing, thus leading to incorrect group assignments. Whenever the system reboots or the Winbind daemon is restarted, the privileges in the /var

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice