Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 146 Next »

25%
Call web pages in the terminal with Browsh
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © yemelyanov, 123RF.com
cases, you can at least guess the appearance of the graphic. Figure 1: Browsh transforms a web page, like this one from Linux Magazine, into a down
25%
When you should and should not use NoSQL databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Artem Gavrysh on Unsplash
be assigned to rows and columns, which makes tables unsuitable in this case. Similarly, tables are not recommended where the type and number of attributes to be stored vary greatly. Because the relational model
25%
Increasing Throughput with Link Aggregation
26.10.2012
Home »  Articles  » 
 
across the links in a LAG; in this case, you will benefit from a larger potential bandwidth. This method allows for simple implementation in switches and servers. Because it does not require additional
25%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
even worse if, for example, customers arrive at what they think is the company's website, when it is in fact a malicious copy that, at best, only confuses the user or, in the worst case, installs malware
25%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
to rely on the Libvirt virtualization framework instead, you can automate many tasks via its API. I recently had such a case: A provisioning front end had been used to generate a variety of virtual systems
25%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
-authentication because, in such a case, the KDC would simply send data to the client encoded with a key derived from the user password. Attackers would then have plenty of time to carry out an offline attack, ultimately
25%
Passkeys eliminate the need for password-based authentication
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Olivia, Fotolia.com
are supposed to use a separate, strong password for each IT system, many don't, and they write down their credentials somewhere they can be easily found; the classic worst case is a sticky note on the monitor
25%
Regular expression security
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Jakub Jirsak, 123RF.com
([ ]) classes of admissible input characters. In this case, no value other than those that would appear in an email address may be present in the input. The first class in the example comprises a-z (all lowercase
25%
Moving Data Between Virtual Machines
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © alphaspirit, 123RF.com
the results. In practical applications, you will probably also have cases in which the packets exchanged between two virtual machines on a physical server are forwarded to a target outside of the box: Most
25%
Simple Event Correlator
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © cepixx, 123RF.com
applications. For the simplest case, SEC uses the Single rule type in which a single find of the pattern triggers an action. The syntax looks like this: type=Single ptype=RegExp pattern=Failed password

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice