Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 149 Next »

13%
Privacy Concerns: Beyond the GDPR
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © RAJESH RAJENDRAN NAIR, 123RF.com
network. I rarely post to the Public unless it's related to my articles or other journalistic writings. You should also Google yourself to find out what the Internet knows about you. Explore the various
13%
What's new in SQL Server 2017
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Fet, Fotolia.com
-server service requires a restart. The sqlcmd command-line query for Linux should reside on a database server, as well, in case network connectivity is interrupted. This utility is also in a separate package
13%
Effective debugging of Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Stuart Monk, Fotolia.com
within the namespaces defined for that container, such as the network and process namespaces that already exist for the container. If you append the -it parameters docker exec also works interactively
13%
Automate the Active Directory Federation Services install
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © drubig-photo, fotolia.com
a certificate authority (CA) in your organization or be a public certificate that is valid outside of the corporate network. It is important to issue the certificate and then export it as a file to be able
13%
Interview with the developer of Singularity
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wu ruiyun, 123RF.com
within a Docker image that they have created can easily escalate to root. But if any non-authorized users gain root access on our production network, that is a breach of security. This means that we must
13%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
is Microsoft Teams, which many companies were forced to introduce as an emergency measure during the pandemic. However, other services such as virtual private networks (VPNs), Microsoft Dynamics 365, Salesforce
13%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
. Therefore, network users have to live with the disadvantages and various negative effects that come with email. Some smaller companies outsource the problem to service providers such as Microsoft or Google
13%
Gleaning Agile Methodology for Infrastructure Projects
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © liudmilachernetska, 123RF.com
engineers, network administrators, and the like. We are the people who support systems and services. We are the ones who keep things going. We have hands on keyboards and are the folks in the trenches
13%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
. Figure 1: Azure Arc-managed servers require their own resource group. On the network side, the ACMA must be able to communicate over the Internet with the Arc services on TCP port 443; of course
13%
IMAP 4 protocol extensions
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Christian Draghici, 123RF.com
was only tentatively gaining ground. Growing Demand To adapt IMAP 4 to modern demands, and especially mobile clients, the Network Working Group of the Internet Engineering Task Force enriched the IMAP

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice