Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 146 Next »

25%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
into consideration the output of another pipeline. trigger – In this example, the trigger defines the factors that start execution of the pipeline for Gerrit. In this case, it waits for a new patchset (or new
25%
Thrashing the data cache for fun and profit
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Lucy Baldwin, 123RF.com
. Figure 3: Simulated CPU cache miss rates. Fully utilizing the data loaded from the slower storage medium (RAM in this case) is a common optimization pattern. Swapping to disk is, of course, the worst
25%
Setting up DevOps Orchestration Platform
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © J¸rgen Acker, Photocase.com
. The new instance then appears in the lower table. In the case of Google Cloud, you must choose a user-defined fully qualified domain name (FQDN) and provide the user ID for the Google Cloud user account
25%
Data Security vs. Data Protection
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Andrea Danti, 123RF.com
authorization. Transport Layer Security (TLS) ensures the confidential transmission of messages. In many cases, assignability is not implemented by default. Classic operating systems store the time a file
25%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
the first modern computers were created. In fact, the concept that attackers leave behind signatures and traces is named "Locard's Exchange Principle." The defender – in this case, the security analyst
25%
Goodbye Google Cloud Print
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © bilderbox, fotolia.com
the mobile phone network, which is never the case if the phone is not on the WiFi network. Even then, the printers are often located in another network segment. Cloud printing is also ideal when printing
25%
Get started with OpenShift
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © andegro4ka, 123RF.com
install qemu-kvm libvirt-daemon libvirt-daemon-system In my case, I see about 70MB of files added after running the command. You should really be running many of the OKD commands that follow as the non
25%
News for Admins
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
 
certain shell extension associations, including .py, .pcap, and .saz. In some cases, certain extension associations, including .doc, .mkv, .torrent, and .skype are required to trigger the next exploitation
25%
Targeted attacks on companies
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Ildar Galeev, 123RF.com
percent of the attackers give up. At least 36 percent of attackers give up after 20 hours, 25 percent after 10 hours, and 13 percent after 5 hours. In the case of companies with a very good IT security
25%
News for Admins
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
its customers not to install iOS updates as they were breaking connectivity. These issues discourage users from installing updates immediately, but in this case, Apple feels an update is necessary

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice