Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (568)
  • Article (186)
  • News (99)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 86 Next »

25%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
different approval processes, a note about the duration and requirements of the approval is also useful. Access for External Users Giving external partners access to applications and systems in the cloud
25%
Windows Admin Center for managing servers and clients
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Dietmar Hoepfl, 123RF.com
is called for the first time, various notes on its functionality appear. When the setup is complete, the browser displays the WAC startup window, and the server where the gateway endpoint is installed
25%
Policy-based DNS in Windows Server 2016
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © mikiel, 123RF.com
| Add-DNSServerClientSubnet -ComputerName SERVER2 Note that all objects already have to exist on the destination server before you can refer to them. For example, if a policy has a subnet condition, all
25%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
sensitive passwords. The debops-task command is a wrapper for the ansible command. Note that after debops is run once and ansible.cfg is generated, you can use the ansible command directly. The best way
25%
Optimizing Windows 10 for SSDs
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Sergiy Serdyuk, 123RF.com
used, it can be destroyed. The tools also list the SMART messages of the installed disk and output warnings if a disk is not working properly. When using SSDs, it is interesting to note that Crystal
25%
Automated compliance testing with InSpec
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Gunnar Pippel, 123RF
Spec is verbose: It not only notes that the test failed but also uses diff to suggest the changes required to pass the test. After making the corresponding change, the problem disappears and calling inspec again
25%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
again, but omit the corresponding GnuPG ID. Again, Pass encrypts all secrets in the store, but this time without the ID that was omitted. It should be noted that the new encryption only means
25%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
and Confluence roles contain various entries that you need to adapt to local conditions before running. Note that jira.yml calls a role named madkiss.certificate, which is a rudimentary role that I wrote
25%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
. Click the Create Access Key button and you're off. Keep a careful note, encrypted, of the secret key, because this is the only time you will see it in AWS. To copy your credentials file locally, use
25%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
.cfg configuration file. Listing 3 shows an example cloud-config file that creates an additional user, executes a command on first boot, upgrades the OS, and finally installs additional packages. Please note

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 86 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice