Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 132 Next »

15%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
address calls up a detailed view of the system in question. As in the settings for an interface, the icon with the warning sign lets you define thresholds for generating alerts and, of course, retrieve
15%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
(domain-specific language), so you have to mix YAML and Groovy within a YAML file. Listing 6 shows a YAML script with a jobs section that creates a so-called seed job that is used later to deploy other jobs
15%
Samba pitfalls in daily operation
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © lightwise, 123RF.com
_USER (1) root@fs-01:~# wbinfo -i test-u1 failed to call wbcGetpwnam: WBC_ERR_DOMAIN_NOT_FOUND Could not get info for user test-u1 root@fs-01:~# getent passwd test-u1 _ Unfortunately, this error
15%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
'll look at shortly, calls such activities a "blend of science, psychology, and art." I think that sums up cybersecurity as a discipline pretty well, too! If you're interested in this area, a friend directed
15%
GitLab for DevOps teams
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © maroti, 123RF.com
, such as buffer overflows or insecure function calls. Dynamic Application Security Testing (DAST) tests against a running application or against the Review Apps collaboration tool [14]. These tests start with each
15%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
source tools for data collection and presentation is the so-called "ELK" stack, which comprises: Elasticsearch: Enables sophisticated searches of large amounts of volatile data. Logstash: Collects
15%
OS10 and Dell's open networking offensive
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Pei Ling Hoo, 123RF.com
the ports on the switch as configurable network interfaces on the OS10 switch. From here, you can walk the tree as required. Because it is a Debian system, you can, for example, call apt-get to install new
15%
NVDIMM and the Linux kernel
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Denis Dryashkin, 123RF.com
. A dmesg command shows free areas (Listing 1). Areas marked usable can be used by the NVDIMM driver. The last line shows an area of 50GiB usable . Calling memmap=16G!4G Listing 1 Showing Memory
15%
NFS and CIFS shares for VMs with OpenStack Manila
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Steve Everts, 123RF.com
(SDN). OpenStack provides its own component called Neutron that takes care of all aspects of SDN. Typical OpenStack clouds strictly separate the private networks of individual customers – based
15%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
a denial of service attack. The other point of view, that of the customer whose VMs are operated by a cloud service provider, is taken into account by Shielded VMs and is called Hardware-Trusted Attestation

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice