Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (323)
  • Article (131)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46

27%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this, the topic is still largely overlooked and a huge amount
27%
FreePBX phone system
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Lofik, Fotolia.com
topics such as a digital fax that is based on HylaFAX [3]. To this day, faxing is still necessary in some countries because it is still the only legally binding form of communication besides snail mail
27%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
the hosting version, which is mainly intended for providers, you can choose the server or advanced server versions. The community version [3] is similar to the server version and has no restrictions
27%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
KeePass [2] or KeePassX [3], where all of their passwords are stored in a file and encrypted with a personal master password, so that no one else can access it. With this approach, passwords can
27%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
Shell 2.0, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
27%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
not manufacture this kind of hardware but works with third-party suppliers that manufacture devices to spec. Several compatible devices from various manufacturers can be found on the market [3]. The core of all
27%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
       logging.debug("Message %d has my subject, processing" % msgnum) 090 091       payload = mimeobj.get_payload() 092       recipient = None 093       subject = None 094 095       for line in payload.split("
\r\n
27%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
techniques and compression algorithms. Public key: RSA EIGamal DSA Cipher: IDEA 3DES CAST5 [Symmetric-key block cipher. 64-bit block size, key size between 30 and 128 bits

« Previous 1 ... 39 40 41 42 43 44 45 46

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice