Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 132 Next »

16%
Working with objects in PowerShell
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Philip Kinsey, 123RF.com
want to work with the data of an object, you need to call its members . These are the components that let you access and edit the information. A PowerShell object supports a whole range of members
16%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
of detouring a request. Anyone responsible for the operation and maintenance of a company website is probably familiar with complaints and emergency calls from users saying that a website cannot be reached
16%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
and installed based on the system properties. On RPM-based distributions, for example, the new-kernel-pkg tool is used; it is called automatically as part of the kernel installation. By default, the ramdisk
16%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
with all of the following: DEP/NX. The idea is trivial: No segment within an ELF binary without the execution bit should be used to hold code that could eventually be called and therefore executed thanks
16%
Rex
19.02.2013
Home »  Articles  » 
, if you ask the programmer, Rex should actually be called (R)?ex. But, because this is difficult to read, write, and pronounce, I will simply use Rex in this article. Freedom of Choice Rex can manage
16%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
, the ability to create what are called type-bound procedures was introduced, which makes calling functions within a class much easier. Fortran 2003 also introduced type extensions and inheritance (key aspects
16%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
>" 13 } . . . 14 ] 15 } Before I describe the procedure further, note that if you want to integrate your cmdlet into the calling conventions of PowerShell, you will need to restrict
16%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
not have to type in the password every time the ubuntu user calls Ansible. As usual, you just need to store the public part of the respective SSH key in the .ssh/authorized_keys file in the ubuntu user
16%
Seeing Through a Web Darkly
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © phive2015, 123RF.com
and second-hand accounts just won't do. This was one of those times. Before this foray into the unknown reaches of the so-called dark web, I'd never cared nor even been curious about such nonsense. To be fair
16%
A Thousand Words Paint a Picture
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rouslan, 123RF.com
automation, or the problem itself. Think about it. When you receive a call to fix several dozen systems that no longer deliver their promised functionality, where do you begin? Of course, you'll ask

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice