Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 115 116 117 118 119 120 121 122 123 124 125 126 127 128 ... 132 Next »

15%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
of the network or carry out further attacks. This spying is also called reconnaissance, or recon. Locating administrator accounts in the network is an important step in this process. By using a pass-the-hash (Pt
15%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
each time (i.e., 70,305 rows). The database then filtered the output of the results into a JOIN table in which it called a WHERE clause. This query also represents the top query in this case, as shown
15%
Integrating scripts into Group Policy
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © abidal, 123rf.com
need to store the files and programs that should call the scripts in the NETLOGON share on the domain controllers (DCs). This is not necessary when integrating scripts into Group Policy, because a copy
15%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
(e.g., the average bandwidth available to a VM, the time taken to process API calls, or available RAM), you can see the extent to which the cloud is already running at full capacity. Everyone can
15%
Protecting Samba file servers in heterogeneous environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by rawpixel on Unsplash
is a secured IPv4 connection if access via IPv6 would be possible? To disable IPv6 on a Debian system, create a file called /etc/sysctl.d/01-disable-ipv6.conf containing the line: net.ipv6.conf.all.disable_ipv6
15%
What's new in SQL Server 2017
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Fet, Fotolia.com
, as described online (Figure 2) [2]. The size of the download is 150 to 200MB, and after calling a configuration script, your SQL instance is ready for use. Migration Discount With the release of SQL
15%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
and the ATA gateways is just as easy as installing. If you decide to stop using the solution, simply call the installed program management on the servers involved and uninstall the gateway or Center
15%
Software-defined networking in OpenStack with the Neutron module
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Michael Roder, Fotolia.com
and return are called floating IPs. This concept regularly meets with incomprehension even from experienced sys admins: If your are accustomed to using the system configuration to give a machine a public IP
15%
Storage innovations in Windows Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liubomirt, 123RF.com
then call these values with the Get-StorageQosFlow PowerShell command. The command then creates a list of all VMs with the measured values. These values can be used as a basis for adapting the environment
15%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
– microarchitecture applications that also scale horizontally. In a complicated mesh construct in a Kubernetes environment, for example, where you can easily call on Helm to roll out Yugabyte, the software lets you

« Previous 1 ... 115 116 117 118 119 120 121 122 123 124 125 126 127 128 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice