Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 民警能否查开房信息-(⏭查询网站gpio17.com⏮)-开房信息最多能查多少年的-在哪可以查开房信息-警察有权查开房信息-(⏭查询网站gpio17.com⏮)-如何通过身份证查开房信息 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (803)
  • Article (71)
  • News (8)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 89 Next »

81%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
. The STA will be run on those big virtual switches to determine the state of the interregion connected ports. In Figure 7, the network is grouped into three regions. The concept is similar to the autonomous
81%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
globally on a system, the Google developers recommend installing with the one-liner: curl -LO https://storage.googleapis.com/container-structure-test/latest/container-structure-test-linux-amd64 && chmod +x
81%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
training participants. An instructor must monitor multiple participants simultaneously and debug a program in order to help participants work in different locations. Our solution is to use the RHEL 7
81%
Ansible as an alternative to the Puppet configuration tool
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Jenzig, photocase.com
manifests and playbooks for virtually any task. Like Puppet, Ansible offers a complete solution for deploying OpenStack in a meaningful way [7]. US hosting service provider Rackspace maintains the code
81%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
package for the Nginx module, so you need to grab it from Google's repository and save it under /opt/ngx_brotli: cd /opt git clone https://github.com/google/ngx_brotli cd /opt/ngx_brotli git submodule
81%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
as key files. The character strings after the -e switch work as regular search patterns. Line 7 moves a key file to /etc/ssh each loop run; line 8 sets appropriate access rights. Assuming ~/.ssh
81%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
/jon.doe/.ssh/id_rsa.pub" 04 cloudflare_email = "com>" 05 cloudflare_token = "<01189998819991197253>" 06 cloudflare_domain = "com>" 07 site_name = "com>" 08 site_author = "John Doe" 09
81%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
to view the alerts (Figure 5). Be warned, it is a self-signed key, so you will get a security warning. Listing 5 Run honeyBot on Boot wget https://github.com
81%
Preparing to move to the cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © mikdam, 123RF.com
Protection (GDPR) [6], which comes into force in May 2018, states that if credit card information is involved, then Payment Card Industry Data Security Standard (PCI DSS) [7] immediately takes effect
81%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
of these security issues than others, but even here there is a need for action, because the ability to hack cars over wireless connections has been demonstrated [7]. Politics has another central challenge to deal

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 89 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice