Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 160 Next »

38%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
does not send the password to the authentication component; instead, it forwards the authentication request to Windows Hello. Windows Hello can then use different authentication methods, such as facial
38%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
intrusion prevention monitoring on any service port that uses username/password combinations for authentication. And while Fail2ban runs as a daemon, it does not expose any new listening network ports
38%
Exchange Online migration with the Hybrid Agent
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Natee Srisuk, 123RF.com
in the connection between a local installation and Exchange Online. Multiple Choices Hybrid Agent does not support Hybrid Modern Authentication, which includes, for example, multifactor authentication
38%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
adds the highest available certificate in the specified certificate chain to the list of signature providers and is usually located directly below the root certificate, because verification does
38%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
of files that are created because the POSIX readdir() function does not sort the output. A different build path, for example, results in changes to the build ID of the binaries. The locale used for the build
38%
Working with the Exchange Management Shell
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © silvae, 123RF.com
. This parameter does not expect a value but is instead set to False by default. If applied, only information about the owner is displayed. However, a combination with -user is not possible. Return values
38%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
to administrators wanting to configure EMET on the command line. This approach does not, however, offer the full scope of the EMET GUI. Running EMET_Conf.exe without specifying configuration switches lists all
38%
Live snapshots with Virtual Machine Manager
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Iryna Denysova, 123RF.com
option in the drop-down menu for stopping a virtual machine, but you would be wrong – or at least a bit wrong. What this feature actually does is freeze the state of the virtual machine and write
38%
Domain name resolution with DNS over HTTPS
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Sergejus Bertasius, 123RF.com
(ISP), because the browser itself does not know the IP address of a particular website. The information presumably is not already stored locally or in a cache ISP-side, so the ISP takes care
38%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
for the infrastructure or the entire IT landscape. What opportunities or risks does SDN carry in this context? Centralizing configuration information allows for the easy detection of events on the network. Anomalies

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice