Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (544)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68

9%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
with your tenant (Figure 3). Although this procedure might sound redundant, it is set up for your privacy. If the request is accepted, the partner can then be found as an external identity in the directory
9%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
a range of hosts on the command line: $ pdsh -w host[1-11] uname -r $ pdsh -w host[1-4,8-11] uname -r In the first case, pdsh expands the host range to host1 , host2 , host3 , etc., through host11
9%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
. Among the parallel shells available, many are written in Python, which has become a very popular DevOps tool. Some of the tools are perhaps not as appropriate or useful for HPC but may be good for other
9%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
that can be hijacked by attackers on the web is not a good thing. Unfortunately, precisely this kind of attack has been extensively documented in the operations security (OpSec) scene. Often the companies
9%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
"SetAllowTSConnections" -Arguments @{AllowTSConnections=1;ModifyFirewallException=1} The command also sets up the required firewall rules to prevent Windows firewall blocking access. Group Policies
9%
Interoperability across clouds
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © alenavlad, 123RF.com
, so developers and administrators can gain some initial experience. Commissioning ARIA TOSCA The TOSCA implementation is based on Python and requires a Python 2.6 or 2.7 interpreter; version 3
9%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
containers, which cephadm then force-fits on systems. This arrangement is all well and good, but if you are used to working with Ceph and then try to run a simple ceph -w at the command-line interface (CLI
9%
Use PowerShell to manage Exchange Online
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © reddogs, 123RF.com
privileges from the context menu. Depending on the execution policy settings, PowerShell blocks unsigned scripts. You can use the Set-ExecutionPolicy cmdlet to change the execution policy and Get

« Previous 1 ... 61 62 63 64 65 66 67 68

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice