Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]time its go each real money[tippo365.com]time its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 98 Next »

9%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
describe later. To enable strong authentication in your Google account, go to https://accounts.google.com/SmsAuthConfig and enter the phone number of your smartphone. Google sends a link to this number
9%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
'm going to be discovered." One mistake during any of the phases (e.g., discovery, persistence, escalation, data egress), and the hacker will get caught. It's the responsibility of the pen tester
9%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
. Only a centralized tool like ATA is capable of keeping track of all these devices and detecting attacks quickly. Setting up the tool is very easy; the network is analyzed immediately after its
9%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
in most cases. I will also mention a few pointers needed for an SSH installation to get us going. Ssshhh Most types of servers listen for inbound connections. Upon authentication – and assuming it's set
9%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
to use as the root switch and tune the root cost on each port. Thanks to PVST, you can choose a different root switch, as well as assign a different root cost, for each VLAN in order to create different
9%
Software-defined storage with LizardFS
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © larisa13, 123RF.com
quite different traditional servers with hard disks or solid-state drives (SSDs) into a pool, wherein each system provides free storage and assumes different tasks – depending on the solution. Scaling
9%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
. Neighborhood Watch In these darker times, when you set a freshly baked server live on the Internet, it’s critical to know how it’s fairing. Knowing how much bandwidth your server is using and how much email
9%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
work with fairly small chunk sizes. Although StorageReview.com exclusively compared ScaleFlux drives in its tests, Percona additionally offered a direct comparison with an Intel P4610 drive [3
9%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
class when I’m working on my MCSE?” My answer was a lengthy explanation of the origins of Unix, DOS, and Windows that ended with, “… and, because real environments are mixed. Few companies, of any size
9%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
is licensed via the User Subscription License (USL). Here, you need to assign a license to each user. This license gives users the ability to access online services in Office 365 as well as internal server

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice