Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 通讯录的微信怎么查-(⏭查询网站gpios.com⏮)-可以查手机通讯录吗-别人欠款如何查通讯录-催款人怎么查通讯录-(⏭查询网站gpios.com⏮)-如何查手机一年前的通讯录6Q ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1166)
  • Article (82)
  • News (13)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 127 Next »

73%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
and commission OpenLDAP server version 2.4.23 on CentOS 6.5. As an example, I will authenticate users of a web server, although the configuration can also be extended for operating systems or other services
73%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
of Windows on corporate networks. Well-known third-party providers are the Defense Information Systems Agency (DISA) [3] and the Center for Internet Security (CIS) [4]. In general, it is worthwhile to work
73%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
a REST PATCH request to the beta endpoint, $uri = "https://graph.microsoft.com/beta/organization/$OrgId" $body = @' { "onPremisesSyncEnabled": null } '@ Invoke-MgGraphRequest -uri $uri -Body $body
73%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
to be dominated by software errors. Linux and Memory Errors When I worked for Linux Networx years ago, they were helping with a project that was called bluesmoke [4]. The idea was to have a kernel module
73%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
://kafka.apache.org/documentation/streams/ ksqlDB: https://ksqldb.io REST proxy: https://github.com/confluentinc/kafka-rest Kafka trends: https://www.youtube.com/watch?v=eRc4SWa6Ivo Kafka future: https://www.youtube.com/watch?v=PRHGymrzGxg
73%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
and finish with some personal recommendations on using them. GPG To start, I'll look at probably the most popular encryption tool, GNU Privacy Guard (GPG) [4]. The tool has become popular because it's fast
73%
WordPress, Joomla, and Drupal compared
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Zoya Fedorova, 123RF.com
not be suitable for your website. Open source competitors such as Joomla [3] and Drupal [4] attract users with interesting and unique selling points. If you want to set up a website for a new product
73%
Manage cluster state with Ceph dashboard
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © damedeeso,123rf.com
the dashboard does not deliver so far, however, is the Prometheus component to generate and send alerts – the Alertmanager [4]. With a little manual work, you can quickly retrofit this element. Because
73%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
as a Windows application. Hitachi publishes its Drive fitness tool as an ISO file [4]. Restoring a Complete Server To restore 2012 R2 Windows Server from a full backup, you do not have to rely on third
73%
Security after Heartbleed – OpenSSL and its alternatives
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Ilya Masik, fotolia.com
[4] (Figure 4) comes from the National Institute of Standards and Technology (NIST). Figure 4: The FIPS logo can only be used by those who adhere

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 127 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice