Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: give seem nan change phone 2 name(711bmw.com)give seem nan change phone 2 name(711bmw.com)w8n ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (191)
  • Article (73)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 27 Next »

23%
Migrating your network to IPv6
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jarts, PHOTOCASE.com
All too often, IPv6 is simply ignored or postponed to make room for seemingly more important things. However, IPv6 is one of the most important topics for the future of IT. The transition to IPv6 ... Abraham Lincoln once said, "Give me six hours to chop down a tree and I will spend the first four sharpening the axe." The transition to IPv6 is a big step for many organizations. Careful planning
23%
Rancher manages lean Kubernetes workloads
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sebastian Duda, 123RF.com
. Some administrators might already be cringing at this point. After all, the Rancher approach seems clumsy at first glance, and above all, it seems to waste resources. It is true that the Kubernetes ... The Rancher lightweight alternative to Red Hat's OpenShift gives admins a helping hand when entering the world of Kubernetes, but with major differences in architecture.
22%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
with get-policy, as before, you will see that the value in defaultVersionId has changed from "v1" to "v2". If you now check the permissions granted by the new policy version, you will see ... Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role
22%
Quick and easy SaaS provisioning for OpenLDAP
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © scyther5, 123RF.com
Application section (Figure 2). Figure 2: Selecting your application in Okta Cloud Connect. If you subsequently change your mind about the app you want ... Provisioning SaaS apps for OpenLDAP users with Okta Cloud Connect lets you retain control of your users' data and access to applications, yet gives them the tools they want.
21%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
. Figure 2: In the Intune management interface, you can also set specific settings for Android and iOS devices. It is not surprising that Windows Phone 8 and Windows RT work best with Windows Intune
20%
Optimizing SQL with Execution Plans
11.06.2013
Home »  Articles  » 
 
. This means that the cost value basically is not suitable for comparing the performance of different SQL instructions. Nevertheless, the cost value can still give you a rough idea of the execution speed
19%
5 Million Google Passwords Leaked
16.09.2014
Home »  News  » 
 
released a statement that plays down (but does not eliminate) the potential danger. The statement says the users on the list have already been notified to change their passwords, and that "only around 2
18%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory
18%
Managing the Build Environment with Environment Modules
06.11.2012
Home »  HPC  »  Articles  » 
on to commercial options later. Thus, your current choice tree is Compiler: GNU BLAS: Atlas, OpenBlas MPI: Open MPI and MPICH2 giving you four possible combinations, so you decide to build them all
18%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
as an officially supported platform. Figure 2: An inexpensive OTG adapter would let you use a Nitrokey with an Android phone. For testing, I decided to use

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice