Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 119 120 121 122 123 124 125 126 127 128 129 130 131 132 ... 146 Next »

24%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
Several of the compression utilities discussed in the previous article are multithreaded, but some utilities had threaded versions of the corresponding serial tools. A couple of cases had more than one
24%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
to 7). Line 6 loads the resulting graphic from the web server in the browser by calling the image() function. jQuery reads the URL from the data.fileref component. In case of an error, line 7 outputs
24%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
(i.e., networked devices) to be in one email report, then the following change in your config file will split up the entries by hostname: SplitHosts = yes In this case, do not limit hosts with Host
24%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
can be retrieved. If this is not the case, the cmdlet fails and displays the error message RPC server unavailable. A new firewall rule that allows Windows Management Instrumentation (WMI) (Figure 1
24%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
.97 S The end of Listing 3 shows how long the query took to run – a smidgen under 10 seconds, in this case. For the curious, according to the SSLyze docs, the Trust Stores Observatory, which “… monitors
24%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
.97 S The end of Listing 3 shows how long the query took to run – a smidgen under 10 seconds, in this case. For the curious, according to the SSLyze docs, the Trust Stores Observatory [7], which "… monitors
24%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
for the application, from the base network infrastructure up, with whatever method you use to define your deployment (in this case, the CDK). In the case of AWS, that means you will very likely start with a virtual
24%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
containing the desired network configuration. A trick comes in handy in this case: Once the system launches, the GRUB bootloader does not first search for the grub.cfg file, but for a file named grub.cfg-01
24%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
or less a monopoly on the desktop, administrators in the enterprise in particular are repeatedly confronted with malware damaging Windows workstations or even rendering them unusable. In such cases
24%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
For most use cases, email has long since replaced conventional letter mail as a means of communication. Companies in particular handle a large part of their correspondence by email, because

« Previous 1 ... 119 120 121 122 123 124 125 126 127 128 129 130 131 132 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice