Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (585)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 68 Next »

7%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
install https://dl.google.com/coral/python/tflite_runtime-2.1.0-cp37-cp37m-linux_armv7l.whl Then, executing the model and making a prediction with the Python API is quite easy. Because I am working
7%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
7674BA52-37EB-4A4F-A9A1-F0F9A1619A2C . Particularly in the case of targeted social engineering attacks by email, but also in the case of classic spam, the malware is often hidden in PDF files that can
7%
Zero-Management Databases
02.10.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
the launch of the database: DNS Name = ec2-11-22-33-44.eu-west-1.compute.amazonaws.com, Port = 3158 DNS Name = ec2-22-33-44-55.eu-west-1.compute.amazonaws.com, Port = 3158 DNS Name = ec2-33-44-55-66.eu-west-1
7%
What's new in Ceph
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Domenico Loia on Unsplash
anyway. Although the typical all-in contracts are still widespread in the US, in many other countries arrangements can be more individual, which, in some cases, leads to independent service providers
7%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
launches CMMC 2.0 program; Jesse Salazar quoted" by Jane Edwards. GovConWire , Nov 5, 2021, https://www.govconwire.com/2021/11/dod-launches-cmmc-2-0-program/ "Stacy Bostjanick shares updated DoD CMMC ... risk and keep information out of the hands of adversaries.
7%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
$ john -wordlist:password.lst passfile.txt 02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) 03 admin (root) 04 t-bone (khess) 05 guesses: 2 time: 0:00:00:00 100% c/s
7%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
visit: http://www.skysql.com. JetBrains Releases PhpStorm and WebStorm JetBrains has released PhpStorm 5.0, its PHP IDE, as well as WebStorm 5.0, the major new version of its JavaScript IDE. PhpStorm 5.0
7%
FreeRADIUS for WiFi hotspots
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Tyler Olson, 123RF.com
the test as follows: eapol_test -c peap-mschapv2 -s Client-Password The client password corresponds to the one specified in the clients.conf file. In the given sample configuration for localhost, it would
7%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
for selection. In this case, simply select Connections ; data should already be available in this area as a result of monitoring. Figure 2 shows the upper area of this connection overview, where you will find
7%
Azure AD and AD Domain Services for SMEs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Alessandro Erbetta on Unsplash
to the Internet, as is sometimes the case with other services. Of course, login names and passwords are sensitive, but they do not directly enable access to a company's business data, for example. Additionally

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice