Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 101 Next »

15%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
remote login. The wave of Bring Your Own Device (BYOD) networking is turning the LAN into unsafe terrain. BYOD Destroys Security Concepts Integrating mobile devices into the rapidly changing networking
15%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
to select the source and target addresses, which are referred to as local and remote . Typically, only restrictions on remote addresses will be relevant. In the input field, you can enter both IPv4 and IPv6
15%
Just-in-time administration in Active Directory
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Orlando Rosu, 123RF.com
of the Remote Server Management Tools (RSAT) for AD Domain Services. To add a user to a group, type: > Add-ADGroupMember -Identity "Group" -Members "User" To remove them again, type: > Remove
15%
PostgreSQL Replication Update
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Golkin Oleg, 123RF.com
, the synchronous_commit option can be adjusted to one of these five values at the session level: remote_apply: A transaction is valid if it is written on both systems and visible on the slave, which
15%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
SoftEther's VPN transport packets as VPN tunnels because HTTPS is used to disguise the connection. Other highlights include: Site-to-site and remote access VPN connections Access to restricted
15%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
_keys = ["${digitalocean_ssh_key.jondoe.id}"] 14 provisioner "remote-exec" { 15 inline = [ 16 "docker run -p 80:80 --name ${var.site_name} -e AUTHOR=\"${var.site_author}\" -d -P ${var
15%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
one interface on the network. You can manage the following devices: Hyper-V virtual machines and virtual switches Physical network switches Firewalls VPN gateways Routing and Remote
15%
VPN clients for Android and iOS
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © fckncg, 123RF.com
or a manufacturer-specific device and those that support open protocols and remote sites. For the test, I set up the Microsoft VPN server in Windows Server 2012 R2 and an OpenVPN server in Ubuntu 14.04. I also
15%
Professional PowerShell environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © lightwise, 123RF.com
parameter, and the consumer is defined by -action. Security is built-in on the second level, script execution. WMI offers its own remote architecture with the Distributed Component Object Model (DCOM), which
15%
Platform independence with PowerShell Core
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image Photo by Harli Marten on Unsplash
/thomas/passwd.html The output of this command generates a tabular report. Remote Access, Old and New In PowerShell versions 2 to 5, remote access is implemented with the WS-Management Protocol. PowerShell endpoints

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice