Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 146 Next »

25%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
? The pen tester's actions should be logged so extensively that the attack and its consequences can be traced. If this is not the case, you will have a problem in emergencies: You will either not detect
25%
U-Move backs up, restores, and migrates Active Directory environments
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Erda Estremera on Unsplash
. In the first step, you are allowed to choose between a Simple restore or Comprehensive restore , which also restores additional information, such as the databases of application servers, if desired. In my case
25%
Combining containers and OpenStack
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Dmitriy Melnikov, Fotolia.com
; currently, several possibilities exist. The most obvious solution is to anchor the container technology within OpenStack with the use of services such as Magnum [5] and Zun [6]. The other case is less obvious
25%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
control lists, ACLs) on routers or Layer 3 switches. In some cases, routing virtualization implemented by virtual routing and forwarding (VRF) is used at the routing level to enable multiclient capability
25%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
. In the case of cloud solutions and traditional hosting providers, the attackers and their victims often reside on the same network. Thanks to virtualization, they could even share the same computer core
25%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
as an author in a blog. In each case, the tool then records the time it takes to complete the action. In this way, you find out whether your responsive design for smartphones is accidentally concealing important
25%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
the malware introduced by the attacker. If this option is not available, you face a choice in most cases: Use a more or less fresh backup and follow up the restore (which must take place on an isolated
25%
Distributed Linear Algebra with Mahout
11.05.2022
Home »  HPC  »  Articles  » 
multiple spheres of computer science and software engineering, including visual simulations, audio analysis, and predictive analytics. In some cases it can be arithmetic-heavy, with methods built up
25%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
Bay – in this case, a 250GB Samsung 850 SSD. My final, ambitious upgrade targets the processor. This system's CPU is socketed, and the original two-core i5-2520M [5] can use some additional brawn to offload
25%
Identity Management from the cloud
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Timothy Ah Koy on Unsplash
to a small sub-area of the large IAM topic. On the other hand, a growing number of offers provides comprehensive functionality for identity provisioning, access governance, and in most cases, identity

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice