Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 有人会查通话记录的-(⏭查询网站gpio18.com⏮)-微信和朋友的通话记录怎么查-查通话记录不要验证码-可以查座机的通话记录吗-(⏭查询网站gpio18.com⏮)-移动和信可以查通话记录吗67 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (276)
  • Article (25)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 31 Next »

79%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
,100) :: array_s ! Uses stack 13 real, dimension(:), allocatable :: array_h ! Uses heap 14 type(other_struct), dimension(5) :: meta_data ! Structure 15 end type my_struct 16 17 ! Use derived
79%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
# Names of all persons: 11 gremlin> g.V().hasLabel('person').values('name') 12 ==>marko 13 ==>vadas 14 ==>josh 15 ==>peter 16 17 # Name of person with ID 1 18 gremlin> g.V(1).values('name') 19 ==>marko 20
79%
Simple OpenStack deployment with Kickstack
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Mechanik, Fotolia.com
offers some additional components, such as a preconfigured Nagios. Infos "OpenStack" by Martin Loschwitz, ADMIN , 2014, issue 17, pg. 28 RDO: http://openstack.redhat.com
79%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
": "0x0800" 07 } 08 }, "ip-match": { 09 "ip-protocol": 17 10 }, "ipv4-destination": "10.1.1.2/32", "udp-destination-port": 1234 11 }, "table_id": 0, "priority": 10 12
79%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
also acts as a USB-to-UART/SPI/I2C adapter and supports Bluetooth spamming. This low-energy denial-of-service (DoS) attack can be used to crash iPhones and iPads in particular. Devices with iOS 17
79%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
in which the operator only allows tested and verified components would be ideal. Infos Zulip: https://github.com/zulip/zulip Mattermost: https://github.com/mattermost/mattermost Rocket
79%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
": [ 16 { 17 "GroupName": "RND-Admins" 18 } 19 ] 20 }, 21 { 22 "Path": "/", 23 "UserName": "guido", 24 "Arn": "arn:aws:iam::123456789:user/guido", 25
79%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
-5) that composed the CMMC framework, with level 1 being the least mature and level 5 the most mature. The CMMC 1.0 framework consisted of 17 cybersecurity domains. A domain is a distinct group of security practices
79%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
:   On each of your machines, install Docker. Version v1.12 is recommended, but v1.11, v1.13 and 17.03 are known to work as well. Versions 17.06+ might work, but have not yet been tested and verified
79%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
Cluster(); 13 cluster.submitTopology("word-count", conf, builder.createTopology()); 14 15 Thread.sleep(10000); 16 17 cluster.shutdown(); This script begins with the declaration of a new topology that uses

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice