Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm 12%2008 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (323)
  • Article (78)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 41 Next »

11%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
Schneier's blog entry: http://www.schneier.com/blog/archives/2012/09/sha-3_will_be_a.html Talk at 25C3 about spoofed MD5 signatures: http://media.ccc.de/browse/congress/2008/25c3-3023-en
11%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
, including separate servers for different regions of the same cloud, the Deltacloud server makes it possible to switch drivers on the go – either by including the HTTP headers X-Deltacloud-Driver and X
11%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
total = summary.values.inject(0) { |sum, i| sum += i } 12 puts "Found #{total} instances in the following states:" 13 summary.keys.sort.each do |s| 14 printf "%20s %d\n", s, summary[s] 15 end 16 puts
11%
Building a port scanner in Python
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Leo Blanchette, 123RF.com
Code, navigate to the Extensions view by clicking on the Extensions icon in the activity bar or by pressing Ctrl+Shift+X and then search for Pylance and install it. This extension provides rich
11%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
: Asymmetrical routing can be relatively easily avoided with namespaces. In practice, virtual veth<x> network devices are fairly typical for network namespaces. Whereas a physical device can only exist
11%
Safeguard and scale containers
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © cepixx, 123RF.com
Since the release of Docker [1] three years ago, containers have not only been a perennial favorite in the Linux universe, but native ports for Windows and OS X also garner great interest. Where
11%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
:%02x%02x\n' 19 83 20 235 Note that 6to4 relays (the machines that handle your traffic) use the anycast address of 192.88.99.1 (2002:c058:6301::), so finding out who is actually handling your traffic
11%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
for this example: Order Deny,Allow Deny from All Allow from 12.12.12.12 Allow from 23.23.23.23 Allow from 34.34.34.34 This example denies access to everybody except the IPs listed, which follows the very sensible
11%
Top PowerShell Cmdlets
14.05.2013
Home »  Articles  » 
 
files in PowerShell using Update-Help . Core Server with a GUI For Windows Server 2012, installing as a core server is the recommended Microsoft approach and is selected by default. An important
11%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
in PowerShell using Update-Help. Core Server with a GUI For Windows Server 2012, installing as a core server is the recommended Microsoft approach and is selected by default. An important innovation

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 41 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice