Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"22%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (450)
  • Article (102)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 60 Next »

22%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
permission from a strictly numeric point of view. When you view a file list, you’ll only see the letters. For example, here are a few files from my home directory: drwxr-xr-x 2 khess khess 4096 2012
22%
Software-defined networking with Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Kirill Cherezov, 123RF.com
with the physical adapters on the host. The physical adapters are connected to physical switches, routers, and firewalls. Special features include quality of service (QoS), HNV, and others. Clearly, managing virtual
22%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
.51, 0, 0.36, 17.74, 0.00, 6.38, 90, 0 2012-01-09 21:10:00, 92, 4.42, 0, 0.35, 20.81, 0.00, 7.22, 100, 0 2012-01-09 21
22%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
systems in the cloud. In addition to hardware devices, you can also manage software-based network services with the Network Controller, which runs on both Windows Server vNext and Windows Server 2012 R2
22%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
the market about 20 years ago with Windows 2000 Server. However, it was to be 13 years before Server 2012 R2 introduced one of the biggest security enhancements in the form of Kerberos authentication
22%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
3 for Exchange Server 2010 and a hot fix for Exchange Server 2007. Older versions such as Exchange Server 2000/2003 cannot be run with Exchange Server 2012. Public folder databases no longer exist
22%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club’s annual congress. This attack allowed them to create a spoofed root certificate on an SSL certificate authority
22%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
, the problem has existed since 2012. The report states that the vulnerability "could affect tens of millions of Linux PCs and servers and 66 percent of all Android devices." The problem, numbered CVE-2016
22%
Exploring the most famous performance tool
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Lucy Baldwin, 123RF.com
: The top command on a Linux system. 15:28:23 up 1 day, 20:10, 3 users, load average: 0.10, 0.14, 0.13 The second line of the display lists the aggregate state of the system's processes – 205 in all
22%
Dispatches from the world of IT
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
 
upgrade for Windows Server 2012. Anderson begins the post by saying the Microsoft cloud is the best place for running Microsoft workloads, then he goes on to add that the Microsoft cloud will also

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice