Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 146 Next »

25%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
to the Lightweight Directory Access Protocol (LDAP), another Internet classic. Both are network protocols that describe how to access information. In the case of LDAP, you consult an LDAP directory, which can take
25%
Leveraging the Sys Admin Brain
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Rajesh Rajendran Nair, 123RF.com
't experienced the scoffs and the sneers when you've suggested a solution, then you're very new to the job – or very lucky. In either case, prepare yourself. I've been a member of the proletariat for so long, I
25%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
uses for such cases. Moments later, I received email telling me that malware was discovered by Palo Alto WildFire analysis [6]. WildFire identifies unknown malware, zero-day exploits, and advanced
25%
Security issues when dealing with Docker images
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Kae Horng Mau, 123RF.com
refer to this as a threat model. In this case, there are three threat scenarios: The manufacturer embeds malicious code and offers infected images. Attackers tamper with the software en route from
25%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
). In the case of multiple concurrent write access, however, it comes at the expense of server throughput and is therefore rarely used. Highly Available MySQL has thus not been able to achieve true high
25%
SMB 3.1.1 in Windows Server 2016
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Pete Saloutos, 123RF.com
-EncryptData 1 In exceptional cases, access can be unencrypted: > Set-SmbServerConfiguration -RejectUnencryptedAccess <0 for False; 1 for True> SMB Encryption can thus be defined per server
25%
Credential management with HashiCorp Vault
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Depending on a company's security paradigm, the admin team members share a joint account or assign admin rights to personal accounts. In the first case, each member must know the account's shared
25%
The Fine Art of Negligence
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Image © zentilia, 123RF.com
beyond the Peter Principle (i.e., that managers, in this case, rise to the level of their incompetence). The particular culture described here rewards incompetence, rewards negligence, and rewards those
25%
Statistics and machine learning with Weka
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Shane Rounce on Unsplash
these models are the algorithms. A variety of algorithms exist, but no one of them is suitable for every case and everywhere. An algorithm that performs well on one data collection can fail on another, which
25%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
with the enterprise configuration and health requirements. Windows AD can send information about devices with classic domain membership; the devices are at least "known" in this case, even if they have not been

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice