Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"22%2000 Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (360)
  • Article (71)
  • News (38)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 47 Next »

21%
Exchange Server through 2025
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Jon Tyson on Unsplash
told, substantial resources have gone into stabilizing Exchange, ultimately at the expense of developing the next version. Route to the New Exchange Companies still using Exchange 2013 that had hoped
21%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
jcb@hercules:# sar -u -f /var/log/sysstat/sa02 -s 12:00:00 -e 13:00:00 Linux 3.5.0-43-generic (hercules) 02.12.2013 _x86_64_ (2 CPU) 12:05:01 CPU %user %nice %system
21%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
Most Internet services rely on the Transmission Control Protocol (TCP), an interprocess communication protocol that dates back to the 1980s, an era when data streams were more like trickles by today
21%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
solutions, such as those proposed in a paper presented at The Digital Forensic Research Workshop in 2013 [11]. Although annoying in forensic investigations, because attackers could also exploit such backdoors
21%
Managing Office 365 in PowerShell
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © sellingpix, 123RF.com
to Hybrid Deployments with Exchange 2010/2013. Licenses To manage Office 365, you first need to store some important information about your subscription, the stored users, and configured settings. The most
21%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
developments in the open source groupware alternatives PostPath, Kerio, Kolab, Open-Xchange, Scalix, Tine 2.0, Zarafa, and Zimbra. PostPath Somewhat unlucky in its hunt for customers, PostPath [1] used to have
21%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
) 01/31/2013 _i686_ (1 CPU)01/31/2013 09:56:01 AM avg-cpu: %user %nice %system %iowait %steal %idle 14.78 0.38 3.47 2.16 0.00 79.21 Device: rrqm/s wrqm/s
21%
PC over IP
03.09.2013
Home »  Articles  » 
 
already familiar with PCoIP from VMware’s VDI solution, VMware Horizon View; VMware licensed PCoIP from Teradici and integrated it into their own product
21%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
Before I begin, I'll explore why a change is needed: According to the Verizon 2013 Data Breach Report [1], weak or stolen credentials account for 76% of network intrusions, and more than 50% use some ... Around since the 1960s, passwords are still the mainstay for authentication. The good news is you have alternatives in hardware multifactor authentication. ... 22
21%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
Research notes the cost of password breaches reached more than US$ 200 billion in annual losses. According to the Verizon 2013 Data Breach Report, weak or stolen credentials account for 76 percent

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice