Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 欧陆娱乐平台注册【www·432v·com】蓝狮在线平台注册setup,荣耀2娱乐平台注册t420 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (300)
  • Article (19)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32

75%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
) Figure 2 shows an attacker using Nmap to conduct a quick discovery with the command: system1$ sudo nmap -sV -O -A 172.16.190.159 -p 445 Figure 2: Attack
75%
Use PowerShell to manage Exchange Online
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © reddogs, 123RF.com
independent, and PowerShell 6.0 will become the standard version for new Windows systems. PowerShell Core 6.x can be installed on Windows clients as well as servers running Windows Server 2008 R2 or later
75%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
on other Linux systems such as CentOS or Fedora. First, you need to grab the JBoss Data Virtualization software [2]. Then, unpack the JAR archive using java -jar jboss-dv-installer-6.0.0.GA-redhat-4.jar
75%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
.msc for computer certificates. When you pass the thumbprint in to rdpsign.exe, make sure you type it without spaces, except at the beginning and end of the character string: rdpsign.exe /sha256 df3e3a36e67a45e8e4 ... Setting up secure RDP connections
74%
Make better use of Prometheus with  Grafana, Telegraf, and Alerta
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Valerie Elash on Unsplash
/dashboards?dataSource=prometheus InSpec: https://www.inspec.io Alerta plugin for Prometheus: https://github.com/alerta/alerta-contrib/tree/master/plugins/prometheus Unsee: https://github.com
74%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
possible tool to run a few VMs with a functional API, antMan is the right choice. Infos edgeLinux: https://antsle.com/products/antmanedgelinux/download/#0www
74%
The TensorFlow AI framework
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © lassedesignen, Fotolia.com
identification: https://www.kaggle.com/c/aerial-cactus-identification MNIST: https://en.wikipedia.org/wiki/MNIST_database NORB: https://cs.nyu.edu/~ylclab/data/norb-v1.0/ TensorFlow-Tutorials: https://www
74%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
to its GPRS and 3G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
73%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
shares, including vWorkspace [3] and Pano Logic [4]. What VDI Means When you consider all the benefits, you might expect virtual desktops to be used in environments at least a few dozen clients

« Previous 1 ... 25 26 27 28 29 30 31 32

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice