Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 196 197 198 199 200 201 202 203 204 205 206 207 208 209 ... 216 Next »

42%
Turbocharge your network with Zeroshell
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Przemyslaw Koch, 123RF.com
point up and running, you can configure other services, such as Captive Portal . Head to the Captive Portal link under the Users section and toggle the GW checkbox. Before you activate the service, use
42%
Google Cloud Storage for backups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © lightwise, 123RF.com
: # sudo apt-get update && sudo apt-get install google-cloud-sdk The next step is to run the gcloud init command and follow the instructions to sign in and authenticate the SDK to your desired Google ... We compare Google Cloud Storage for Internet-based backups with Amazon S3. ... Google Cloud Backup ... Google Cloud Storage for backups
42%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
manually from the certification authority and then bind them to the HTTPS protocol. If you also run IIS functions such as the central SSL certificate store, you can create an efficient solution
42%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
this problem. In the run-up it removes information from the build that could lead to incorrect results (Figure 5). Figure 5: The toolbox: The most important tools
42%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
Digger X . With the Company Stalker machine, you simply select it, enter the domain of a company that has authorized you to conduct a scan, and click Run
42%
Platform independence with PowerShell Core
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image Photo by Harli Marten on Unsplash
architecture always has been the distribution of apps. Developers need an existing and suitable .NET framework version on the target system, and changes have to be adapted to the run-time environment
42%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Wayne Daniels, 123RF.com
applications are fast, secure, and available. What is QuickAssist? Intel QuickAssist Technology runs on Intel architecture. At a high level, the platform pairs an Intel architecture processor(s) with the Intel
42%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
those preferences in a more targeted way. Already, existing evaluations of web browser metadata are being enriched with information from Facebook or Google to get a clearer picture of customers
42%
Web-based network monitoring
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © arasdubov, 123RF.com
simultaneously on the screen in the form of history charts. The first step is to open the Charts option in the hamburger menu at top left. A table with the active hosts and the services running on them
42%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
names in ascending order because the original names are already reserved for other MAC addresses. This approach reveals a major drawback of this concept: An installed and configured Linux cannot be run

« Previous 1 ... 196 197 198 199 200 201 202 203 204 205 206 207 208 209 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice