Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 138 Next »

28%
Building a virtual NVMe drive
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © lassedesignen, 123RF
If you paid close attention, you'll see an NVMe device resides among the list of drives, which will be the device you will use for the write-back cache of your RAID pool. It is not a very large volume
28%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
to groups as Member or Owner , and the options for SharePoint sites are Member , Owner , and Visitor . Applications in AAD can have very flexible role assignments because AAD supports app roles as a flexible
28%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
verifiable DNS responses. Providers and organizations that use at least this standard to thwart attacks, such as DNS spoofing and DNS cache poisoning, would be very desirable. At the moment, however
28%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
or their own operating system and thus run directly within the system on which the container is started. This arrangement is good not only for developers, who can thus very quickly and independently provision
28%
NAS with Btrfs-based Rockstor
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Lane Smith on Unsplash
the very first boot process – only after a further restart. The only indication of an error is your browser: If it does not want to establish a connection after a few seconds, the network configuration
28%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
without using a shared secret such as a password. Installing Pass is very easy with the distribution's package manager. The example in this article is a status page that interactively shows statistics
28%
Connecting Windows Server 2016 with Azure
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Yannick Pulver on Unsplash
, this is not always so easy and unfortunately not very stable. An article on the Microsoft Developer Network (MSDN) provides more instructions [1]. You can also check the successful connection in the Azure portal
28%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
credentials will be on your local machine available to a non-privileged user, which is why I use the superuser to add a little more security and privacy. One other very minor thing to consider is that if you
28%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
< code > The parallel directive is a way to express parallelism in your code. Table 2 is a very simple example of getting started with directives in both Fortran and C
28%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
, Get-WinEvent has far more to offer and can be very helpful if you plan to use PowerShell for monitoring. Microsoft describes the cmdlet in more detail online [3] and shows you, for example, how

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice