Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brian calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (490)
  • Article (106)
  • News (71)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 67 Next »

14%
News for Admins
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
 
Nextcloud Hub Now Supports End-to-End Encryption The pandemic has caused many admins and users to migrate from public to on-premise, private clouds. And with Nextcloud being one of the most capable
14%
Software-defined wide area networks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © ktsdesign, 123RF.com
routes, this amount of packet loss can quickly cause problems. Latencies in the range of 50 to 200msec are also common for connections between continents via the Internet, often disrupting sensitive
14%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
systemd." As expected, the open source community responded swiftly and released a patch before it could cause any harm, unlike WannaCry or Petya. Coulson reported that a patch to resolve the vulnerability
14%
Configuring complex environments
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Austin Neill on Unsplash
- "Episode VI - Return of the Jedi Knights." You should avoid using tabs if possible because they can cause issues when processing the data. By the way, you do not have to write strings in parentheses
14%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
causes problems. Most important is the often missing ability to communicate between isolated solutions because a wide variety of security tools are implemented in the silos – and usually more than one
14%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
of a program causes the highest CPU utilization or which task uses how much memory. This information can be used either to optimize the program or to manage a running system and prevent bottlenecks. You can find
14%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
, controlling the hypervisor can cause even greater damage immediately. Also, basically no malware protection products are available for ESXi on the hypervisor itself. VMware also does not think that antivirus
14%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
Pentium 3 processor. The cause was a detached heat sink, and some older hardware did not have built-in protection circuitry back then. I have also had fun experiencing intriguing boot failures from
14%
Load test your website with Siege
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Aarón Blanco Tejedor on Unsplash
Sing) effect; as such, it can bring down a running server. This article is written only for educational purposes, and you alone are responsible for any damage caused by any misuse of this software
14%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
capacity to what is known as tarpitting (i.e., bogging something down), it is possible to cause a denial of service unwittingly to your own services. Therefore, you should never blindly deploy security tools

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice