Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 133 Next »

16%
Data security and data governance
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Maksim Kabakou, 123RF.com
security products include the following functional areas: Vulnerability assessment: identifying potential points of attack, configuration errors, and other dangers. Data discovery and classification
16%
Monitoring changes in Active Directory with built-in tools
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Tobias Tullius on Unsplash
| Administrative Templates | Windows Components | Event Log Service | Security you can set the value for Specify the maximum log file size (KB) to suit your needs. At this point, you should note that each DC
16%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
scanning of cloud resources is interesting despite its status. At this point, it only works with AWS, but it shouldn't be too long until the other major hyperscalers are supported. To use the scanner
16%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
point it makes sense to deploy a more cost-efficient solution. Because MinIO is an S3-compatible and battle-proven solution, it becomes the main choice in such scenarios. Things become interesting when
16%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
://kubernetes.default.svc --kustomize-image my-image:v1.0.0 The --path argument points to the location of the Kustomize overlay in the Git repository, and the --kustomize-image argument sets a Kustomize image tag that overrides
16%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
addresses rather than entering an entire subnet. It kind of defeats the purpose of having this protection if you're going to immunize every system from being banned. The point is that if a system
16%
Exchange Online migration with the Hybrid Agent
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Natee Srisuk, 123RF.com
at this point. When using the Hybrid license, no mailboxes can reside on the server. You also need to select the target platform, which is where you enter the location of your online environment – this could
16%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
for a project and installed by an admin. It then runs through a life cycle in which it receives regular patches. At some point, it is no longer needed or is outdated. In the virtualized world, the same thing
16%
Radeon Open Compute Ecosystem
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
to see what we've done – the core of ROCm – become a natural extension of the Linux driver and Linux distros – and all of the programming model on top of it. We're trying to get to a point where it's just
16%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
security measures," Sintonen says. F-Secure detailed how the exploit may work. All you need to do is reboot the system and enter the boot menu. Typically, you can't go beyond that point as there is BIOS

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice