Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (514)
  • Article (175)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 Next »

9%
Rex
19.02.2013
Home »  Articles  » 
on the administrator’s own machine, which even can be a Windows or Mac OS X machine; the only important thing is that you have a Perl environment in place. To install Rex, first pick up the git versioning tool (using
9%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
9%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.0 release, including time delays
9%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
but fell at the last hurdle for one reason or another. Then I remembered my mighty friend htaccess. Spending about US$ 20 a year to register a really short domain name on one of the briefest top
9%
Quick and easy SaaS provisioning for OpenLDAP
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © scyther5, 123RF.com
the identity provider (IDP) URL from Okta's per-app SSO setup instructions and download the X.509 certificate; then, upload them to your admin account with the SaaS service provider. As users try to log
9%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
by 100 – for example, SLI (%)=(Positive events/Valid events) x 100. The classic SLI values are availability or latency, of which you do not want to exceed a certain limit. You can define SLOs
9%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
environment outside of the maker scene. Infos Espressif MCUs: https://www.linuxpromagazine.com/content/search?SearchText=ESP8266&x=0&y=0 Azure Sphere: https
9%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
on US financial institutions last year, the offenders achieved 20 times the effect of ordinary desktop botnets with a handful of servers. This trend exacerbated brute force attacks on WordPress sites
9%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
://raw.githubusercontent.com/duy13/vDDoS-Protection/master/latest.sh chmod +x latest.sh ./latest.sh All components are then available under /vddos on the local filesystem. In the best open source manner, the developers of vDDoS do
9%
Ralph, the open asset management tool
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sebastian Duda, 123RF.com
and Support. The forms are similar to those for creating assets. A special Windows agent named Don Pedro [4] is available for discovering Windows-based systems. It only requires an installed .NET 2.0

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice