Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (388)
  • Article (71)
  • News (38)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 50 Next »

22%
Managing Office 365 in PowerShell
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © sellingpix, 123RF.com
to Hybrid Deployments with Exchange 2010/2013. Licenses To manage Office 365, you first need to store some important information about your subscription, the stored users, and configured settings. The most
22%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
.6.32-220.4.1.el6.x86_64 kernel GigaByte MAA78GM-US2H motherboard AMD Phenom II X4 920 CPU (four cores) 8GB of memory (DDR2-800) The OS and boot drive are on an IBM DTLA-307020 (20GB drive at Ultra ATA
22%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
on the options you chose, but some sample output is shown in Listing 1. Listing 1: Sample iostat Output [laytonj@home8 IOSTAT]$ iostat -c -d -x -t -m /dev/md1 2 100 Linux 2.6.18-308.16.1.el5.centos.plus (home8
22%
PC over IP
03.09.2013
Home »  Articles  » 
 
and data, PCoIP can allow or prohibit looped USB devices explicitly. Workstation with Host Card With a host card, you can turn a powerful Windows or Linux PC (and probably Macintosh computers from 2013Q3
22%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
Before I begin, I'll explore why a change is needed: According to the Verizon 2013 Data Breach Report [1], weak or stolen credentials account for 76% of network intrusions, and more than 50% use some ... 22
22%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
Research notes the cost of password breaches reached more than US$ 200 billion in annual losses. According to the Verizon 2013 Data Breach Report, weak or stolen credentials account for 76 percent
22%
Working with Microsoft Azure RemoteApp
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © bloomua, 123RF.com
in the cloud via Microsoft's Remote Desktop Protocol (RDP). All operating systems for which Microsoft offers RDP clients therefore come into play on the end devices. This applies to Apple's iOS and Mac OS X
22%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
the expense and annoyance of the vendor lock-in associated with so many SAN solutions. In 2013, Red Hat introduced an SDS product designed to give users a viable alternative to a SAN: Red Hat Storage Server
22%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(e.target.result)); 18 }; 19 }; 20 }; 21 } Line 1 stores a key (truncated in the listing) for encrypting and decrypting application data in the variable encRawKey as a hexadecimal numerical sequence. The enc
22%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
Ladar Levison may be an unfamiliar figure except to a few people in the community, but many are familiar with his former company: Lavabit, which was in business from 2004 to 2013. Lavabit ... 25

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice