Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: เว็บบอลสเต็ป2(liทe@rules)เว็บหวยออนไลน์.ikv ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (484)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 58 Next »

32%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
rate. Claws Mail Claws Mail [1] was created in 2005 as a fork of Sylpheed [2]. The cross-platform software uses the GTK+ toolkit and can be found in the software repositories of most common
31%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
images are also included in the dependencies that are necessary to build the container. The Makefile section in Listing 2 illustrates this. Listing 2 Managing Dependencies gentoo
31%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
today, including Snort [2] and AlienVault (OSSIM) [3]. Each has its strengths. Snort remains the premier signature-based IDS tool. OSSIM adopts a similar approach to Bro. I wouldn't include Ntop [4
31%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
Gone are the days when Hyper-V was trying to catch up with the basic functionality of VMware. After the release of Windows Server 2012 R2, Microsoft's hypervisor drew level with vSphere for most
31%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
will be followed this time, although test builds are now available online [2]. Jigsawing One core feature of Java 9 par excellence is the Java Platform Module System that became known as Project Jigsaw [3]. Thus
31%
Central logging for Kubernetes users
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © zlajo, 123RF.com
logging, aimed primarily at Kubernetes users who are already using Prometheus [2]. Loki claims to avoid much of the overhead that is a fixed part of ELK. In terms of functionality, the product can't keep
31%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
that allows interpretation. After preparing the data set appropriately, rules for intelligent software behavior can then be defined. In traditional machine learning, the user decides as early
31%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle
31%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
authentication. The sshd file is relatively readable and includes rules about locales and even Message Of The Day settings if you ever want to alter them. Innards of the Beast If you navigate to the /etc
31%
Archiving teams and channels
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Adis Corovic on Unsplash
option (Figure 2). Again, you need to set the SharePoint site to read-only. Figure 2: You can archive clients in the Teams contextual menu. Provided

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice