Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (568)
  • Article (187)
  • News (99)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 86 Next »

25%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
an acknowledgement to the client pod (Figure 2). Now the client and VPN gateway establish a point-to-point connection. Note that all connections in the Network Service Mesh are based on these kinds of point
25%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
it on the server as usual with the cert statement. On the server, use CAfile to specify the certificate from the CA to verify the server's certificate chain correctly. Also interesting to note is that stunnel v5
25%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
on both machines. You should note that the ports used for an operation like this differ from OS to OS. Just keep in mind a few simple facts: Ports below 1024 are normally reserved for system use, so save
25%
Continuous upgrades for Windows 10
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © golffoto, photocase.com
solutions for third-party components. Instead, they are dependent on the vendors, whose release notes should prove worthwhile. My recommendation is to use Microsoft internal products for virus scanners
25%
What's new in Ansible 2.0
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Viktor Gladkov, 123RF.com
=value Incompatibilities The complete release notes [5] refer to many "API changes." Unfortunately, the developers do not relate in detail what exactly these changes do, other than a section about escaping with the use
25%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
are encrypted with the stated algorithm. The user now has no chance of decrypting without a key. It is important to note that the user only has a certain time window in which to decrypt their data. If the user
25%
Dealing with VHDX files
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Alina Pavlova, 123RF.com
chain. This situation can occur if several snapshots build on each other. Note that if the chain is destroyed, for example, because the path of a disk has changed, the connection cannot be restored
25%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
chain security Figure 2 shows additional interdisciplinary functions. Of note are policy management and monitoring in the broadest sense (i.e., topics such as extended detection and response, XDR
25%
Provisioning resources with an Azure-specific language
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © vectortatu, 123RF.com
outputs; then, add the property you want to retrieve. Note that the output is of the object type: output storageEndpoint object = stgModule.outputs.storageEndpoint Many organizations already have a large
25%
Benchmarking a new architecture
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
easily enough once it is no longer the focus of the vendor's attention. For the former, the available port of Ubuntu (2023-07 based on Lunar Lobster) [6] makes the case nicely. It is worth noting

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 86 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice