Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 75 Next »

16%
Many approaches help secure a web server
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © alexwhite, 123RF.com
, such a certificate already achieves the full 100 points in the category. The test also determines the supported SSL/TLS protocols for the Protocol Support category. Old and insecure protocols lead to point deductions
16%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
eventually lead to the trojan encrypting the user data and insisting that the user pay a "penalty" for accessing forbidden materials online.
16%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
Lead to SamSam Ransomware Researchers at Cisco Talos found a vulnerability in JBoss that can be exploited by SamSam ransomware. Cisco Talos said in a blog post, "As part of this investigation, we
16%
Improved logging in Samba Winbind
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © monsit jangariyawong, 123RF.com
/software/realmd/docs/guide-active-directory-client.html#idm139657557854144 The Author Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product
16%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
The Author Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product Experience group. He
16%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
. Figure 2: The BGP peering process comprises six phases. This process uses the interface on the routers that leads to the target IP address according to the routing table. To be able to cover
16%
Encrypting DNS traffic on Linux with DoT
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Alexander Grey on Unsplash
Product Lead for Identity Management and Platform Security in Red Hat's Product Experience group. He is a regular speaker at various international conferences and writes a lot about open source software.
16%
Dispatches from the world of IT
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
 
's viewpoint, the new agreement can only lead to new customers and a new channel for selling their support services. Additional terms of the contract were not specified
16%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
, of course, and, above all, in full color. At that time, VMware clearly had the lead in terms of performance with its upcoming implementation of the PCoIP protocol. The decision was underpinned by its leading
16%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
in 2025 [1]. In the long term, it's possible that these rising numbers could lead to the elimination of the slot for physical SIMs in mobile devices and to eSIMs becoming the sole standard. eSIM technology

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice