Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (465)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 56 Next »

27%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
The Internet of Things is predicted to be a huge market in the next 10 years, taking the dumb objects around us and making them data-noisy. ... easy to gauge the scale intuitively. The fact is that lots of Internet of Things (IoT) use cases are still hypothetical or just commercially unproven. Your car could talk to the city parking space ... The Internet of Things is predicted to be a huge market in the next 10 years, taking the dumb objects around us and making them data-noisy. ... A Management Platform for the Internet of Things ... The Age of The Internet of Things is upon Us
25%
Secure passwordless logins with FIDO2 and LDAP
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
specifically use when selecting the private key: attributetype ( 1.3.6.1.4.1.56227.1.1.2 NAME 'fido2credentialId' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE ) This identifier ... Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication. ... Store FIDO2 info in LDAP ... Secure passwordless logins with FIDO2 and LDAP
24%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
transmission of digital signals, whose function is completely definable in software. One pin each maps the values 0 and 1 in the simplest case – for example, to switch on an LED (output) or to query the position ... Microsoft Azure Sphere links three vital elements of the Internet of Things – microcontrollers, software, and cloud service – with a focus on security. ... Azure Sphere for Internet of Things
24%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
Requests for Comments (RFCs) [2]-[5] under numbers 8999 to 9002 in 2021 after a good five years of development at the Internet Engineering Task Force (IETF). In addition to Google, developers from Fastly ... The UDP-based Quick UDP Internet Connections (QUIC) protocol comes with mandatory TLS encryption and promises faster speeds. ... Quick UDP Internet connections
24%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
Some would make the case that Perl is the most used and most capable scripting language on the Internet today, and this is probably true. Its versatility and ease of use has made it an industry ... Perl sockets work like file handles that can span across a network or the entire Internet. ... Internet socket programming in Perl
23%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
level of TCP streams and UDP datagrams) and 7 (HTTP/application protocols) can be configured comprehensively, whereas the underlying Layer 2 and Layer 3 network (frames and IP packet layers) cannot. Who ... Mesh Service for OSI Layers 2 and 3
23%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
, the answer to the Common Name prompt is login.example.com (Figure 2). Keep the certificate, the private key, and the passphrase somewhere safe; better yet, memorize the passphrase ... To spoil the day for lurking data thieves, Apache administrators only need three additional directives – and a handful of commands. ... Setting up SSL connections on Apache 2
21%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
of all cases, SQL injection was the root cause of a server’s compromise. ... Within a couple of hours, an experienced Internet attack specialist can bring your server infrastructure to its knees. In many cases, the barn door through which the attackers gain entry ... of all cases, SQL injection was the root cause of a server’s compromise.
21%
Cluster-Aware Updating for Windows Server 2012 R2
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © bahri altay, 123RF.com
can only be used with Hyper-V; you cannot automatically update other cluster services with SCVMM. CAU, on the other hand, supports all cluster roles in Windows Server 2012 (R2), including Hyper-V. Only ... Cluster-Aware Updating for Windows Server 2012 R2
21%
Microsoft System Center Virtual Machine Manager 2008 R2
14.07.2011
Home »  CloudAge  »  Articles  » 
 
Shell 1.0 or 2.0, Windows Remote Management (WinRM) 1.1 or 2.0, and the .NET framework 3.0 (SP1). The webbased SCVMM SelfService Portal additionally requires Internet Information Server (IIS) version 7.0 ... Microsoft System Center Virtual Machine Manager 2008 R2

« Previous 1 2 3 4 5 6 7 8 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice