Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (345)
  • Article (83)
  • News (36)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 47 Next »

25%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
/json;charset=utf-8\n\r\n\r%s" %json.dumps(obj) Lines 9 through 18 iterate against all entries of a database cursor, which the call to the find() method in line 9, generates from the queried data collection
25%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
web interface, a REST API, and support for a wider array of databases. Because Icinga was forked from Nagios code, it maintains compatibility with Nagios plugins [3]. Some of Icinga's key features are
25%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
download the Windows Server 2022 Security Baseline.zip file. The Policy Analyzer mentioned earlier is delivered to your computer in the PolicyAnalyzer.zip file. The first archive contains various guidelines
25%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
58453/tcp open unknown 60132/tcp open unknown MAC Address: 00:0C:29:FA:DD:2A (VMware) Nmap done: 1 IP address (1 host up) scanned in 31.35 seconds Listing 4 Hijacking the MySQL Database
25%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
to manage them disappeared. Container Linux ruthlessly replaces the entire /usr directory instead of individual files (Figure 3). The main work is handled by Linux containers à la Docker [20], or Rkt [21
25%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
bytes:215392635 (215.3 MB) TX bytes:1759757 (1.7 MB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK
25%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
, offices, and labs are not data centers and have power and cooling limitations. Standard wall sockets in the US are 120V, and common amperage values in the home are 15 and 20A. A 15A circuit has a capability
25%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
* 10 * daemon started successfully * 11 List of devices attached 12 015d8bed0d3c0814 device If you use the commands from the SDK regularly, it makes sense to add its path, preferably like
25%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
than a single variable/value pair can be passed, à la: cdk -c VAR1=value1 -c VAR2=value2 This mechanism provides a great deal of power and flexibility, particularly when considering the use of CDK
25%
Malware Remains Top Cause of Cybersecurity Incidents
16.01.2023
Home »  News  » 
 
Malware was responsible for 40 percent of confirmed cybersecurity incidents in 2022, as measured by Orange Cyberdefense and detailed in a recent report. According to the Security Navigator 2023

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice