Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (306)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 138 Next »

28%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
important product in the new System Center. Microsoft fully integrates the functions of the System Center Mobile Device Manager 2008 in SCCM. However, this offering was not very comprehensive without
28%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
The information_schema and dvwa databases are worth closer attention. information_schema tells the user about the metadata in the database, such as data types or access privileges. This metadata can be very
28%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
is that Keccak's internal structure is very different from the existing SHA-2 functions. If problems do arise in future, there would still be an alternative that did not suffer from the same issues. At the end
28%
Working with objects in PowerShell
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Philip Kinsey, 123RF.com
their names. Also, this example shows very nicely that these are mostly methods and properties of the respective object. Figure 1: The output of Get-Member shows
28%
Avoiding KVM configuration errors
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dan Barbalata, 123RF.com
security patches, but the admin can also use other means to reduce the likelihood of a guest breaking out. To begin, you need to be very familiar with the main software components of your KVM ecosystem
28%
Remote access with ThinLinc 4.12
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Clem Onojeghuo on Unsplash
The COVID-19 pandemic is credited with being a catalyst in the area of digitalization. Processes had to be digitalized within a very short time at a speed that previously seemed impossible
28%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
of the information. The remainder is a stack trace, some of which can be very long-winded. If everything works, a call to kubectl, # kubectl -n kube-federation-system get kubefedclusters NAME AGE READY earth 2h True
28%
Migrating CentOS to Rocky Linux with migrate2rocky
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Ray Hennessy on Unsplash
migrate a freshly installed server, the script should run without any trouble. On the other hand, very few people need to migrate a freshly installed CentOS 8 server because, if you are setting up a server
28%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
to the Default Domain Controllers Policy . However, at this point, it is a good idea to proceed very carefully before you set the values from the baselines. You need to make sure the policies do not overwrite each
28%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
of key pair, whether ECDSA or ED25519, and therefore the choice of curve, has practically no influence on security. Both methods are considered to be very secure; ED25519 delivers slightly better

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice