Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente"500 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (219)
  • Article (85)
  • News (9)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 Next »

44%
Sharing threat information with MISP
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Ricardo Resende on Unsplash
on http://127.0.0.1:5000 . You will see the overview of your local MISP server and can proceed to complete the configuration. If you click on Server Settings & Maintenance below Administration , you
44%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
ports, one USB 3.2 Type-C, two RJ-45 LAN ports, five audio jacks, built-in Intel® Wireless-AC (a/b/g/n/ac/ax), and Bluetooth 5.0. To accommodate such power, System76 had to put serious work ... In the news: Red Hat Enterprise Linux 8.3 Available, It's Official – Linux 5.10 is the Next LTS Kernel, System76 Unleashes World's Smallest Quad-GPU Workstation, Canonical Releases Autonomous
44%
Goodbye Google Cloud Print
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © bilderbox, fotolia.com
printers. What may not be a problem with a 10-person start-up generates an unreasonable amount of work with 5,000 employees. Security through printer vendor- and location-independent release printing (i
44%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
and institutions. The trojan changes almost weekly and is known under the following names: Ransom: Win32/Locky.A: TrojanDownloader: O97M/Bartallex TrojanDownloader: BAT/Locky.A TrojanDownloader: JS/Locky.A
44%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
a9a6615fb5c045693 | root@alice:~# quantum port-list +--------------------------------------+------+-------------------+ | 0c478fa6-c12c-... | | fa:16:3e:29 ... OpenStack workshop, part 3:Gimmicks, extensions, and high availability
44%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
of continuous integration [2] or continuous delivery [3], allowing developers to extend their projects quickly, add new features, and deliver the goods. Because they handle classical administrative tasks
44%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
licensed. NexentaStor [3] distinguishes between the Community Edition and the Enterprise Edition. The Community Edition is free, but not intended for production systems (which the EULA explicitly forbids
44%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
.332000000169501 secs Stopped at iteration = 2378 The maximum error = 9.99983047509922507E-005 All four CPUs had a very high load (100 percent) during the run. Comparing Figures 3 and 2, you can also see
44%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
breach. Infos Introducing Stethoscope: https://netflixtechblog.com/introducing-netflix-stethoscope-5f3c392368e3 Jamf: https://www.jamf.com LANDESK: https
44%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
yourself a headache and don't use them. HTTP requests usually use port 80 or 8080. Port numbers roughly in the range 1025 to 5000 usually produce adequate results. Just be sure to use the same port on both

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice