Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo霸屏【电报e1000】google收录外推.how.0x05 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (329)
  • Article (126)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 Next »

68%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
-enabled clients, such as the Lightning Thunderbird extension, Evolution, OS  X applications like Apple's iCal (Calendar since Mountain Lion), as well as iOS and Android systems. For this to work, the Kolab team ... data available on iOS and Mac OS  X and in Thunderbird and Evolution.
68%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
. TLS is a later version of Secure Sockets Layer (SSL), and this kind of connection is often still called an SSL connection. The box titled "Tap-Proof" shows how to set up an encrypted connection ... 15
68%
Easy configuration management with Puppet
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Warangkana Bunyarittongchai, 123RF
requested. The important word is: you . It sets it up as you requested. Many admins have learned how to configure a server by installing things manually, so automating the configuration steps can lead ... 15
68%
Enterprise resource planning and customer relationship management with open source
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © ximagination, fotolia.com
with creating a requirements profile that maps all the relevant processes. The intent is to examine how to retrofit missing functionality or possibly add that functionality by integrating software packages
68%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
-encrypting devices (SEDs). However, not everyone is using encryption. Recent revelations about accessing the data of individuals include the story about how the NSA and Britain's Government Communications
68%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
" 12 tapetype "EXAMPLE-TAPE" 13 define tapetype EXAMPLE-TAPE { 14 length 100 mbytes 15 filemark 4 kbytes 16 } 17 define dumptype simple-gnutar-tcp { 18 auth "bsdtcp" 19 program "GNUTAR
68%
Rex
19.02.2013
Home »  Articles  » 
on the administrator’s own machine, which even can be a Windows or Mac OS X machine; the only important thing is that you have a Perl environment in place. To install Rex, first pick up the git versioning tool (using
68%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
. Subscription customers pay EUR15 per user per year, with a sliding scale in increments of five users. Data Control Kopano extends the core features of the groupware platform to include modern technologies ... Kopano Groupware seeks to be more than a slot-in replacement for Microsoft Exchange. We reveal how you can commission the platform and the highlights it offers.
68%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
68%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
or administrator password unnecessary. The problem of how to define emergency passwords still persists; every organization wants to continue managing its servers even if the usual administrator is not available ... 15

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice