Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 146 Next »

25%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
for the first time, it does not have an Authelia session cookie. In this case, the tool redirects you to its own login page, where you first need to verify your ID by providing a username and password. Double
25%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
protocol and is correct, but the code itself is susceptible to integer and buffer overflow attacks. In the general case, the danger is minimized if the X server and X client programs run with the same user
25%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
bits in this case. For security reasons, the command encrypts the key using the AES256 method, which is why you need to enter a passphrase (i.e., a longer password). Armed with the private key
25%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
, the user simply takes the reserve unit out of the cabinet, plugs it in, and carries on – the admin does not need to be there looking for mistakes and does not need to unscrew the case, restore data from
25%
Nagios alerts implemented via VoIP
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Zentilia, 123RF.com
; this might be difficult in some cases because providers tend to use their own designations for id and realm. If in doubt, you can call your provider's hotline. --null-audio tells the server not use any audio
25%
Microsegmentation in the data center
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Chalong Tawan, 123RF.com
generic policies that can then be implemented accordingly – in this case, with Cisco ACI. In each case, the result comprises structures that have become far more flexible and dynamic than ever before, which
25%
News for Admins
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Gernot Krautberger, Fotolia
camera connector. The Raspberry Pi Foundation is working with Kinneir Dufort and T-Zero "to create an official injection-moulded case. This shares the same design language as the official case
25%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
.14, although you can still resort to Docker Machine [3] in this case, which creates a virtual Linux system on the local host that you can then use to access the Docker engine. The example in Figure 1 uses
25%
News for Admins
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
 
is purpose-built for containerization and virtualization. But as of version 5.1, it adds a third use case: edge. Three of the very exciting, new edge-centric features are secure device onboarding, live
25%
Bpytop command-line monitoring tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Filip Mroz on Unsplash
on the command line. In some cases, the ncurses library provides a slightly more elegant interface for user interaction. However, bpytop [4] takes a slightly different approach. As the name suggests, the tool

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice