Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 146 Next »

24%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
. In this case, you will need to use sudo. In the device settings, which you can access by clicking on the gear icon of the device entry, you can enable the applications to be monitored with the module settings
24%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
, or trigger database reorganizations. In the case of highly privileged tier 0 systems, however, this process creates an area of tension that has barely been taken into consideration for years and is only now
24%
Chatbots put to the scripting test
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © lexandersikovl, 123RF.com
supplemented by one roll of the dice in the transformers to produce a response. However, in the case of generating program code, you would want the mathematically most probable result, not one that is co
24%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
support STARTTLS (a protocol command that switches from plain text to a Transport Layer Security (TLS) or SSL connection), in which case you will need to provide an SSL certificate on the mail server
24%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
for detection purposes. You can assume that the selected APT is currently also being used in Ukraine and Western Europe, so the example relates to current and real threats to CRITIS. Sandworm Team As a case
24%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
tasks – security in this case – forward as far you can in a process chain is also known as the shift-left approach. In terms of containers, shift left means taking security aspects into account as early
24%
Configure Entra ID with PowerShell Desired State Configuration
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Tom Hermans on Unsplash
authorizations need to be assigned in a granular way and protected for each use case. Whoever controls the configuration-as-code component – in this case the server with PowerShell DSC or the configuration files
24%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
of Listing 5, which create the application container. In this case, the connection to the database container is simply defined as 127.0. 0.1:3306, because the database port is open inside the pod, but cannot
24%
The basics of domain-driven design
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Christos Georghiou, 123RF.com
and defined as a whole, then it is also too large to model completely in software. In this case, it is better to represent self-contained parts of a domain in separate, smaller models, which allows the software
24%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
the IP address for the Ansible connection. The example here shows how EDA can react in case of a DNS failure; in that case, it has to contact the host by the IP address, of course. Setting Rules The test

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice