Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 146 Next »

24%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
as a payload opens a reverse shell in this case – ransomware would now encrypt the computer and open a backdoor. A hijacked Windows 10 machine, for example, now gives the attacker access from the command line
24%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
and upgrade instructions, the website also offers detailed uninstall instructions, in case a user happens to find Cozy less than all that. Not a Multiuser Cloud In the strictest sense of the word, Cozy really
24%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
with minor adjustments. Only in this step do you get around to implementing the API. OData REST works especially well in the case of Internet applications with large numbers of users and million
24%
Manage logical volumes with GUI tools
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © grafner, 123RF.com
, a last checkpoint allows you to intervene in the case of a faulty configuration (Figure 14). Figure 14: YaST – like other tools – first shows you a summary
24%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Amawasri Naksakul, 123RF.com
versions; I've read it's built in from 16.04 onward): $ sudo apt install snapd Snaps are usually pulled from the Snap Store [10], which is comparable to the Docker Hub. To get going, it's a case
24%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
' terminated with exit code 11 you can determine which process ID is holding the device open by typing: $ sudo fuser -m /dev/drbd0 /dev/drbd0: 597 In my case, it is the multipathd daemon: $ cat
24%
Managing access credentials
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Marcel Goldbach, photocase.com
hierarchical level, you do not have to switch to the desired level first. Instead, enter the correct path for the new directory in the Parent Folder field. Note that in such cases the hierarchy always starts
24%
The light-footed Hiawatha web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Olexandr Moroz, 123RF.com
from the small solutions segment that trip up when it comes to larger files. Reverse Proxying Is Easy An increasingly common use case for web servers, because of security concerns, is as a reverse
24%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
is allowed to authenticate at all. If this is the case, it tries to assign a role to the user with RoleBinding. If this also works, Kubernetes finds out which rights the user has on the basis of the role found
24%
Multiprocessing in Python with Fortran and OpenMP
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Photo by Zachary Young on Unsplash
to the initial code are simple. The only change is to convert it from a "program" to a "subroutine." No arguments are passed to the subroutine in this case, and all output (write ) statements go to standard output

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice