Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (470)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 57 Next »

6%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
straightforward. If a processor was operating at a fixed frequency of 2.0GHz, CPU utilization was the percentage of time the processor spent doing work. (Not doing work is idle. ) For 50% utilization, the processor
6%
Wireshark
27.11.2011
Home »  Articles  » 
 
for the required fields. The main feature of the new version is support for more than 30 new protocols including JSON, Wi-Fi P2P (Wi-Fi Direct), and Fibre Channel over InfiniBand. Also, Wireshark 1.6.0 can export
6%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
on the Internet, and administrators need to rely on proprietary support in case of problems. With a response time of 48 hours, the risk is that users will not be able to work with the mail system for two days, so
6%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
-Forwarded-Proto" expr=%{REQUEST_SCHEME} ProxyPreserveHost On ProxyPass / http://127.0.0.1:4711/ ProxyPassReverse / http://127.0.0.1:4711/ ServerName www.example.com Server
6%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
Windows Server 2016's default settings might not always meet your network requirements. Depending on its purpose, the server requires different tweaks to unleash its true performance
6%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
A distributed denial of service (DDoS) attack on Spamhaus [1] (Figure 1), a provider of real-time DNS blacklists, affected a part of the Internet last March with a flood of data reported to reach ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... DDoS in the Cloud
6%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
Security groups in AWS: https://docs.aws.amazon.com/de_en/AWSEC2/latest/UserGuide/using-network-security.html Security groups in OpenStack: https
6%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
/en-us/marketplace/ Microsoft Power BI: https://powerbi.microsoft.com/en-us/ The Author Thomas Joos is a freelance IT consultant and has been working in IT for more than 20 years. In addition, he writes hands
6%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
vulnerability (CVE-2015-0311) to run TeslaCrypt on the system. A check is performed to see whether the URLReader2 COM interface has been installed correctly in the DirectShow Filter Graph List [1]. The malicious
6%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
/FiloSottile/age Rage Rust variant: https://github.com/str4d/rage The Author Dr. Matthias W¸bbeling is an IT security enthusiast, scientist, author, consultant, and speaker. As a Lecturer

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice