Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (590)
  • Article (186)
  • News (70)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 85 Next »

48%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
, such as the /usr/bin/mail command, which is about 350KB in size? Before mail clients had all the requisite capabilities necessary to send files across the Internet, the files had to be encoded (wrapped
48%
Version 5.2 of the Ruby framework
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Author, 123RF.com
, the community's response to this feature proved to be mixed. Many found it useless right from the start, because the team members still had to exchange a secret encryption key. Others found it practical
48%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
releases and features in an accessible, detailed manner. Over time, the installation process, which initially had a reputation for being a little too arcane for beginners, has been simplified by both
48%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
-A ports, one USB 3.2 Type-C, two RJ-45 LAN ports, five audio jacks, built-in Intel® Wireless-AC (a/b/g/n/ac/ax), and Bluetooth 5.0. To accommodate such power, System76 had to put serious work
48%
News for Admins
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
 
to 1.22, you had to disable swap in order to run a Kubernetes cluster. This addition should make deploying Kubernetes even easier for admins. There have also been a few removals from Kubernetes. Many
48%
Pentest your web server with Nikto
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mike Wilson on Unsplash
blocked by attack detection mechanisms. Although I had always run against a particular .de successfully for other security tests, I fell foul of the attack detection systems when I ran Nikto against
48%
Exchange Server through 2025
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Jon Tyson on Unsplash
told, substantial resources have gone into stabilizing Exchange, ultimately at the expense of developing the next version. Route to the New Exchange Companies still using Exchange 2013 that had hoped
48%
News for Admins
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
 
of email fraud." Domain-based Message Authentication, Reporting and Conformance (DMARC) analysis (https://dmarc.org/) performed by Proofpoint showed that "none of the top U.S. and U.K. universities had
48%
News for Admins
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
 
PHP framework. Unit 42 estimates around 500 to 1,000 infected systems are currently being used by WatchDog to mine for cryptocurrency and the total profit was estimated at 209 Monero coins (worth roughly $32
48%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
was finally restored on the morning of November 8 after the company had rebuilt large parts of its internal infrastructure. Experts piecing through the evidence say the attack came from two different sources

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice