Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (88)
  • Article (36)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

24%
Retention labels in Office 365
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © stokkete, 123RF.com
a unique name in the dialog (e.g., Employee left ) and click Next . In the Event settings dialog, click Choose an event type and select Employee left . After clicking Next , you can define to what exactly
24%
Mail Helpers: Improve Your Email Experience with These Handy IMAP Extensions
08.07.2013
Home »  Articles  » 
 
When the first version of the Internet Message Access Protocol 4 (IMAP 4) appeared in 1994, mobile phones looked more like bones you would give your dog than phones – and they couldn’t do much more
24%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
). I name this inline policy whatever I like (e.g., AutoEC2inline ). If you get really stuck, add the permissions in the Inline Policy section without using the JSON editor. It’s relatively easy to get
24%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
important SIEM tasks is correlation. To this end, fields must be structured and named uniformly. HTTP codes, for example, have different names on different systems (e.g., http_response_code on one system
24%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory
24%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
in execution time by about a factor of 10 (i.e., it ran 10 times slower than without profiling). Listing 3: pprofile Output Command line: md_002.py Total duration: 1662.48s File: md_002.py File duration: 1661
24%
Hadoop for Small-to-Medium-Sized Businesses
06.05.2014
Home »  HPC  »  Articles  » 
financial institutions put a stop to credit card abuse, among other things, and better assess the creditworthiness of their customers in the scope of risk management. In e-commerce and online and mobile
24%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
include some of the biggest names in IT, social media, and the entertainment industry, including Amazon Web Services, AOL, Apple, eBay, Facebook, Netflix, and HP. However, Hadoop 2.2.x is especially
24%
U-Move backs up, restores, and migrates Active Directory environments
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Erda Estremera on Unsplash
and Active Directory environments faster and more easily than would be possible with the on-board tools that come with Windows Server. (See "The Verdict" box.) With the wizards and the extensive
24%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
SMART Attributes Tracked by an Intel 320 SSD ID Attribute Name Hex Flag Value Worst Threshold Type Updated When Failed Raw Value 3

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice