Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]time its go each real money[tippo365.com]time its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 98 Next »

8%
Open source customer relationship management software
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Martina Berg, Fotolia.com
to the market in 1999. SuiteCRM is a very powerful business toolkit. Beneath its mild and perhaps slightly antiquated user interface is hidden a powerhouse of business automation and management tools. Suite
8%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
. It remains to be seen whether Microsoft is willing to complete its subsystem. Infos Windows Subsystem for Linux documentation: https://msdn.microsoft.com/de-de/commandline/wsl/about Cygwin
8%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
the machine starts so that software can be pulled from it. To avoid having to enter access data each time, you can save the data in the ~/.vagrant.d/Vagrantfile file. The service manager plugin helps explore
8%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
, such as CPU, memory, and time, to encrypt the file. If you want to encrypt the file and very rarely decrypt it, you might want to use an algorithm with a very long hash key. If you're going to be decrypting
8%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
Sleuth Kit [12] are also useful for Android. Each operating system stores its configuration details in a typical form; Linux uses readable configuration files, Windows uses the Registry, and Android
8%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
), when you had to transfer large host files from node to node. PowerDNS is notably in use at some of the largest ISPs and websites in the world, such as AOL, Shaw Cable, and even Wikipedia. Its compact
8%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
is wrong – in this case, the WAP has failed to reach its ADFS server. command returns a list of the 170 cmdlets in ADFS 2016, some of which are useful for monitoring or just to see what's going on ... Problems with ADFS trusts can affect network access for Office 365 or associated partner companies. Fortunately, administrators have various monitoring options.
8%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
number of services visible within the AWS Console is simply staggering, which is why AWS is still the dominant cloud provider – admittedly with Google Cloud and Microsoft Azure hot on its heels
8%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
and reattach to the screen  session in that new terminal. As you will see in a subsequent section, you can even SSH from a remote system into the system in which you started the screen  session and attach to it
8%
Tools that extend Bash scripting
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Laschon Maximilian, 123RF.com
for user interaction, or for information. Although I still cling to my command-line interface, sometimes it's easier to click on buttons or enter information in boxes than to memorize the options for certain

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice