Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brian calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (490)
  • Article (106)
  • News (71)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 67 Next »

14%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
frames. In the case of speech codecs with high compression, replacing lost speech frames is made even more difficult because the dependencies between successive frames cause errors to propagate beyond
14%
Best practices for secure script programming
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Jorge Fernández Salas on Unsplash
parts of IT that repeatedly cause serious security issues is shell scripts. Employing best practices can ensure secure script programming. Letting Off Steam Impressive proof of the potential harmfulness
14%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
and causing broadcast storms that would very quickly overload a network segment. The Spanning Tree protocol performs this magic by disabling certain connections between switches. Modern switches use a spanning
14%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
Although it caused huge excitement at its announcement by Google in 2011, web real-time communication (WebRTC) has somewhat faded from the general tech consciousness. Maybe it was oversold as a done
14%
High availability with Oracle Standard Edition
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © aquir, 123RF.com
is possible. Unfortunately, the terminology and its use also often causes confusion, especially with Data Guard. The differences lie in the usability of the replica. Although a "Physical Standby" is built
14%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
at the application level precisely target weaknesses in the victim's software architecture with the least amount of data capable of causing damage. Multiple-vector attacks alternately and systematically target
14%
IO500
02.02.2025
Home »  HPC  »  Articles  » 
according to the IO500 benchmarks to locate the specific patch that caused the performance problem. This process helps them understand what the patch did to cause the problem or perhaps allows them to look
14%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
-site request forgery (CSRF) attack, which can cause actual damage, is in 13th place [2]. CSRF attacks got the lower rating because most web applications are now developed using frameworks, and most of them now
14%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
systems. As an alternative, many products include an automatic discovery function, but you should only use this if you can be sure of avoiding inconsistencies with other data sets. Inconsistencies can cause
14%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
bundled with PHP. Red Hat released an advisory stating that the vulnerability "allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice