Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 216 Next »

42%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
Safeguards for the IT infrastructure often neglect email as an attack vector. Although most companies run a spam filter, they pay far too little attention to phishing, and many companies have
42%
Apache OpenMeetings video conferencing platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Chris Montgomery on Unsplash
OpenMeetings is not a ready-made platform. IT managers need to provide the hardware or platform on which it runs, which can mean servers in your local data center or in the cloud. The Kurento Media
42%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
as cached session IDs, which performed significantly better. Another consideration that needs to be kept in mind is that the test is against Google as a whole, their primary domain running in an obvious round
42%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
of the entries associated with an event, even if they are in different logs or have different tags. This method can be more important than you might think: If a user's application doesn't run as well today
42%
The light-footed Hiawatha web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Olexandr Moroz, 123RF.com
and running quickly with the solution. What Hiawatha Can Do Anyone researching Hiawatha on the web will be confronted with a variety of possible explanations for the origin of the word. It is a social dance
42%
No Hands
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
by another automated system that crunches the data and distills it into easy-to-read charts, graphs, and color-coded statuses. These technologies are not far away, Of course, even the smoothest-running
42%
Interprocess communication essentials in Perl
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Carsten Reisinger, 123RF.com
dependant. It is readily available on Unix or Linux machines, but you'll run into problems on a Windows system because the command is not supported on that platform. Signal Handling On Linux, processes can
42%
Server administration using Cockpit
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexandr Marinenko, 123RF.com
, on which the software must also be running. This functionality makes Cockpit – developed by Red Hat – similar to the well-known Webmin [2]. The user interface which, according to self-promotion, is easy
42%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
Security concept. I do need to point out a possible pitfall: the BIOSes of many notebooks run the SECURITY_FREEZE_LOCK ATA command when booting to provide protection against manipulation. In this case
42%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
the authorization level, grab system information, and even damage the system with malware. Frameworks such as Nishang [1] and Empire [2] are available for these objectives. Running Malicious Scripts with Nishang

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice