Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌留痕推广【电报e1000】google推广seo.ypc.0x05 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (95)
  • Article (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14

75%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
server (hosting) Resolving DNS server (caching) API to provision zones and records DNSSEC support (as of 3.x) Web-based management options DNS data stored in plaintext (BIND compatible
74%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
74%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
74%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
)_$ARCH $ curl -sLO "https://github.com/eksctl-io/eksctl/releases/latest/download/eksctl_$PLATFORM.tar.gz" $ curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" $ tar -xzf "eksctl
73%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
for different scenarios on the website [9]. The Bitnami project pages supply users with installers for Linux, Windows, and OS X, as well as a virtual machine for VMware [10]. To set up the DAM system yourself
73%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
. When talking about six remote offices, the level of hands-on activity is acceptable. If every office needs direct communication with every other office, you would need 15 tunnels. If the business has
73%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
developed by the career platform LinkedIn to process massive volumes of data in real time. Today, Kafka is used by more than 80 percent of the Fortune 100 companies, according to the project's own information
73%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
title: Text('Hello World'), 15 ), 16 body: Center( 17 child: Text('Hello World'), 18 ), 19 ), 20 ); 21 } 22 } The source code of an app in Flutter
73%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before

« Previous 1 ... 7 8 9 10 11 12 13 14

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice