Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brian calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (490)
  • Article (106)
  • News (71)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 67 Next »

14%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
query that triggered it. Thanks to extensive logging capabilities, you can quickly find the root cause of any problem. In the case of the Koha library system, GreenSQL had difficulties with the set
14%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
has been able to cause a real collision up to the present day  – one thing was clear: SHA-1 was not secure for the long term. This just left the previously little-used hash functions of the SHA-2
14%
Controlling virtual machines with VNC and Spice
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Oleg Doroshin, 123RF.com
for a remote desktop protocol; it is widespread beyond the world of Linux and causes the least problems in production use. One alternative to VNC, however, is the new Spice protocol, which promises superior
14%
Living with multiple and many cores
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
that have limited its usage. First, all data must traverse the PCI bus. This is often a slow step for some applications and, if not managed in an optimum way, can cause poor performance. The programming tools
14%
Automating the Azure infrastructure using a command-line interface
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © nk88, photocase.com
are bearable if you compare the benefits. Shutting Down Servers Correctly Every minute you run a VM on Azure costs money. What often causes surprises is the fact that servers that are shut down are still
14%
Monitor Windows systems and Linux servers
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Shao-Chun Wang, 123RF.com
Manager, which require a fee for monitoring. You can also see individual servers that you have connected. Clicking on the link with the connected server causes the server name and other information
14%
Avoiding KVM configuration errors
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dan Barbalata, 123RF.com
to decide to forward the packet. Forwarding a response packet often does not work in practice, but still, an incorrectly routed DHCP or DNS packet can cause a great deal of damage. The admin must therefore
14%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
. If it is clear that the hard drive is causing the trouble but is still generally working, it can be useful to make a complete copy of the disk (e.g., with Clonezilla [1]) before starting data recovery measures
14%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
, but it does cause more administrative overhead. However, if you rely on cloud providers where privacy concerns exist, this method gives you clear control over where containers are running. Setting up
14%
The Resurrection of bWatch
02.06.2025
Home »  Articles  » 
Photo by NASA Hubble Space Telescope on Unsplash
 bWatch window, selecting Refresh  causes bWatch to update the information for all nodes possible (Figure 5). Figure 5: Refreshed bWatch. Back to Shared Memory Although missing just

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice