Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo霸屏【电报e1000】google收录外推.how.0x05 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (329)
  • Article (126)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 46 Next »

69%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
about how difficult it is to handle multiple passwords, and your day could turn into a password reset ticket nightmare. If you wonder whether a single sign-on (SSO) experience à la Google and Amazon
69%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
's hardly something I'd bet the ranch on from a security perspective. Build your own image if you're concerned with its provenance and integrity. The owner of the image tells you how to change the My ... Pitting the OWASP Zed Attack Proxy against an insecure web app in a Docker container illustrates how you can tick a lot of security checkboxes.
69%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
the operating system's advanced configuration do not pose any obstacles, either. In this article, I show you how to use PowerShell to access WMI and performance data on local or remote computers, how to find
69%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
. The collection can be installed on your Ansible controller node with the ansible-galaxy command. The Ansible controller node must have, at a minimum, Ansible version 2.14.x installed to support the AIX collection
69%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
. These commands can be piped or controlled with parameters. In this article, I show you how to set up and use a Crescendo environment in Linux. Crescendo was available as a Technical Preview at the time of writing
69%
Mesos compute cluster for data centers
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Artisticco LLC, 123RF.com
Authentication and Security Layer [14]) with Crammd5 [15]. As of version 0.20, authorization was also introduced for framework authentication [16] . Mesos distinguishes three categories: roles, users
69%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
. For example, the current two streams of Python are the 2.x and the 3.x series. Python 3.0 chose to drop certain features from Python 2.x and add new features. Some toolkits still work with Python 2.x and some
69%
Next-generation terminal UI tools
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Lucy Baldwin, 123RF.com
of terminal user interface (TUI) libraries, including Ncurses [3] and Newt [4]. Jeff Layton has previously graced these pages with a tutorial on how TUI tools are developed today [5], and yours truly followed
69%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
likes Bob who follows Carol and Dave on Twitter. Streetcar line 15 runs from Max-Weber-Platz via Giesing to Gr¸nwald. Mr. Huber is the superior of Mr. Meyer and Mrs. Schulze. Theresa liked the video ... How graph databases work
69%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
messages and in staff memories; thus, valuable know-how is lost when an employee leaves the company. As a first-aid measure, a wiki typically is used, or someone tidies up the folder structure jungle. FAQs

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice