Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (585)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 Next »

7%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
of MFT, but each must be optimized for the application in question. Infos "Data Protection Laws, an Ocean Apart" by Natasha Singer, The New York Times , February 2, 2013, http://www.nytimes.com
7%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
://oxpedia.org Scalix: http://www.scalix.com Scalix 12.5: http://www.scalix.com/main/37-english/support/400-scalix-12-5-release-notes Tine 2.0: https://www.tine20.org Zarafa: http://www.zarafa.com Zarafa
7%
Privileged Identity Management in Azure AD
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © lassedesignen, 123RF.com
into the wrong hands or from accidental misadministration. Of primary importance is the use of separate accounts – accounts that are not used in daily work, such as email, phone calls, or internet searches
7%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
MX 10 mail.example.com ns1 A 192.168.1.10 ns2 A 192.168.1.11 mail A 192.168.1.13 www A 192.168.1.14 (For simplicity and brevity’s sake
7%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
for more than 30 new protocols including JSON, Wi-Fi P2P (Wi-Fi Direct), and Fibre Channel over InfiniBand. Also, Wireshark 1.6.0 can export SSL keys and SMB objects. Another new feature in Wireshark 1
7%
Security after Heartbleed – OpenSSL and its alternatives
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Ilya Masik, fotolia.com
Status Report": http://www.youtube.com/watch?v=3jQoAYRKqhg FIPS: http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402LogoForm.pdf LibreSSL: http://www.libressl.org Bob Beck
7%
New Features in PowerCLI 6.0 R3
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Rgbspace, Fotolia.com
The initial version 6 of PowerCLI, the Windows PowerShell interface for managing VMware vSphere, appeared in March 2015 to coincide with the release of vSphere 6.0. In mid-September 2015, release 2 ... PowerCLI 6.0 Release 3 ... New Features in PowerCLI 6.0 R3
7%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
:YUOqsWaZWpl europa:RfXOqsYaZWsa callisto:PgRxO.tsvW.adk The first part of each line is the username – one of Jupiter’s moons in this case – followed by a colon and then a hashed password to keep any local users from
7%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
client and server TCP stacks. In this article, I've broken the list of tuning options into three groups: (1) NFS performance tuning options, (2) system tuning options, and (3) NFS management/policy options
7%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
of marketing? Clair If you are looking for an old hand in the container security circus, Clair [1] is certainly a candidate (Figure 1). Clair is not an independent software component but part of the Quay ... Vulnerable software and incorrect settings cause problems, but administrators have some tools at hand that can help with container security.

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice