Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (470)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 57 Next »

6%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
Management (IAM) support common open identity standards – for example, Security Assertion Markup Language (SAML) 2.0, OpenID Connect, and OAuth 2.0 – to facilitate identity federation. To secure your root user
6%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
be associated with a Microsoft Windows Enterprise licensing structure. Refer to Microsoft's quick start documentation for more detailed information about licensing considerations affecting a dev box deployment [2
6%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
Start image download: http://www.eucalyptus.com/eucalyptus-cloud/get-started/try/faststart/download Console User Guide: http://www.eucalyptus.com/docs/eucalyptus/3.2/ug/ The Author Tim
6%
Software-defined networking with Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Kirill Cherezov, 123RF.com
in a cluster with Windows Server 2016 and Windows Server 2012 R2, you can easily move VMs between the nodes. In this case, however, you should only manage the cluster from servers with Windows Server 2016. You
6%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
by the web application. In the example in Listing 2, the cookie is logged_in and the associated domain is example.com. Listing 2 Cookie for Registered Users 01 sub vcl_recv 02 { 03 if ((req
6%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
administration of OpenStack clouds. Cloud computing installations in particular must be able to scale massively horizontally – the perfect use case for classic system automation. So, if you want to know how
6%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
/en-us/download/details.aspx?id=104005 Security Compliance Toolkit: https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10 BSI SiSyPHuS: https
6%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
might still be around today. (CC BY 3.0 US [1]: Laura Poitras/Praxis Films, Wikimedia) Figure 2: The US authorities sought a court order forcing
6%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
is a freelance IT consultant and has been working in IT for more than 20 years. In addition, he writes hands-on books and papers on Windows and other Microsoft topics. Online you can meet him on http://thomasjoos.spaces.live.com.
6%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
The horror scenario: Your organization's data has been encrypted – in the worst case, after the data has been stolen and is at risk of ending up on the darknet. The measures used to mitigate

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice