Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (103)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

84%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
://learn.microsoft.com/en-us/security/privileged-access-workstations/esae-retirement Privileged Access Management and Shadow Principals: https://www.teal-consulting.de/en/2018/08/14/esae-series-part-3
84%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
, such as ipv6.Domainname.com. Figure 1: Create DNS reverse entries for your IPv6 addresses at an early stage – the example shows the web hoster Strato, whose
84%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
messages, one of which had an attachment. Figure 3 shows the directory structure in the storage directory after running the script. Figure 3: Directory
84%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
up with the use of a professional backup tool. Other consoles for management tasks (e.g., for antivirus software) are also normally hosted on the server. Increasing Dependencies The server
84%
Advanced security in Windows Firewall
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Andrius Repsys, 123RF.com
in the main window in the middle (Figure 3). The first overview shows the configuration (Profile) of the individual network locations. Figure 3: The management
84%
openlava – Hot resource manager
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Konrad Bak, 123RF.com
to pay attention to a few gotchas. (In my first attempt, I didn't pay attention to these.) In the next sections, I'll walk through the installation of openlava on a cluster (the Warewulf-based cluster [3
84%
Zarafa on the Univention Corporate Server
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Andres Rodriguez, 123RF.com
and with Kerberos realms that typically match the boundaries of the DNS domain. Because UCS creates a Kerberos realm to match the DNS domain when you install the DC Master (in the DNS domain example.com , the realm
84%
Manage your own datawith ownCloud 2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Ratchanida Thippayos, 123RF
in the spring of 2010 as a KDE project based on open standards but not requiring any KDE application as a dependency. It is free software released under the Affero General Public License Version 3. Version 2
84%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
editor, grep, and a cross-referencer (either cscope [2] or LXR [3]). Although automated source code vulnerability scanners have their place, especially in auditing very large code bases, I haven't found ... 3
83%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
. Figure 3: Normally, a regular router responds to the request by sending an RA. Rogue Routers If a rogue router is active and sends an RA to the multicast group FF02::1 (Figure 4), the network

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice