Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 133 Next »

18%
Many approaches help secure a web server
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © alexwhite, 123RF.com
identity data with simple options. Ranking A+ For an A+ ranking in Qualys server testing, you only need to check a few points of your configuration. The test checks connection security in four categories
18%
IP Fabric 7.0 Released
21.02.2025
Home »  News  » 
 
-view dashboards for tracking security operations or monitoring compliance. Visio export for creating detailed diagrams. Expanded security capabilities including Check Point, Palo Alto, and Stormshield support
17%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
Different components of Microsoft 365 use different portals for managing services such as Teams, SharePoint, and Exchange, making administration difficult. With an arsenal of scripts
17%
XP Apocalypse
20.08.2013
Home »  News  » 
 
Computing group, whose blog post titled "The Risk of Running Windows XP After Support Ends April 2014" tried to put the issue in context. Rains pointed out that, after security updates cease, Windows XP
17%
Microsoft Unifies Tech Conferences for 2015
22.07.2014
Home »  News  » 
 
," will absorb the standalone events for SharePoint, Lync, Project, and Exchange, and it will co-locate to coincide with the popular TechEd conference. Redmond nixed the Microsoft Management Summit (MMS) last year
17%
Facebook Moves Data Center: How to Migrate 30 PB of Stored Data
02.08.2011
Home »  News  » 
 
At some point in spring 2011 Facebook just ran out of power and space in the data center, and it became clear they had to move over to a new one. The stored data had grown from 20 PB to 30 PB
17%
Turla Malware Variant Targets Linux
09.12.2014
Home »  News  » 
 
for communication with these sites, but of course, modified versions of the code could easily point to different places. Ars Technica points out that investigators could also build a profile using the YARA malware
17%
glibc Vulnerability Puts Certain Linux Systems at Risk
03.02.2015
Home »  News  » 
 
-execute safeguards. Qualys expressed alarm about the attack but pointed out that not all glibc-based applications are affected. Tests show that Apache, cups, gnupg, isc-dhcp, mariadb, mysql, openldap, samba
17%
Deflategate Reaches HPC
11.02.2015
Home »  HPC  »  News  » 
 
to 10.5 psi will actually make the ball easier to throw or catch. According to the report, “… we modeled the pressure points of a human hand on the exterior of a football that represents a throwing
17%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
Every IT infrastructure offers points of attack that hackers can use to steal and manipulate data. Only one thing can prevent these vulnerabilities from being exploited by unwelcome guests: You need

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice