Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • Article (28)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

12%
Database availability groups – High availability with Exchange Server 2012
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Pavel Isupov, 123RF.com
in the web-based Exchange Management Console or in the Exchange Management Shell. If you use IPv6 in the enterprise, the new database availability group wizard tries to assign an IPv6 address
12%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
for Microsoft Word 2003, or go to View Macros if you are using Microsoft Word 2010. Then copy the first portion of evil_payload.vbs – from Sub Auto_Open() to End Sub – and paste it into the Visual Basic
12%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
of BusyBox. Administrators can use it to check out what has happened or restart the installation. As of this writing, ONIE supports the Switch Light [6] operating systems by Big Switch Networks, Cumulus
12%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
be used at the same time. Listing 1 Displaying Keys 01 ;; ANSWER SECTION: 02 mozilla.org. 6074 IN DNSKEY 257 3 7 03 Av//szWRDSGz3g4JkiuQqws79YZ6nwxk0f9PF9MCQSYrRGd0f4
12%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
, unless you apply a later version, IEEE 802.1X-2010, in combination with 802.1AE (MACsec). The standard offers better performance and is less complex to implement than classic Internet Protocol Security
12%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
are documented in the .zip file format specification. Also, starting in version 6.2 of the ZIP format, file name encryption was introduced so that metadata was encrypted in what is called the “Central Directory
12%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
. Infos "Introducing Capsicum: Practical Capabilities for UNIX" by Robert N.M. Watson et al., ;login , December 2010: https://www.usenix.org/publications/login/december-2010-volume-35-number-6
12%
Cluster Documentation Project
08.05.2012
Home »  HPC  »  Articles  » 
, not designed by product marking types, and user ownership and control. Openness and ownership are often cited as why open source software has had a viral growth through the entire computer industry. The 2010
12%
Manage resources with AWS CloudFormation
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © krisckam, 123RF.com
to the stack creator }, "AWSTemplateFormatVersion" : "2010-09-09" } The Stack The sample template that I will be using for a basic WordPress blog uses a single Amazon Elastic Compute Cloud (EC2) instance
12%
Web applications with Flask
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Photographer, 133RF.com
. An alternative to Django is Flask [1], which has become increasingly popular since its inception in 2010. The advantage of Django is that it comes with more or less everything you need for many web applications

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice