Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 132 Next »

16%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
from HTTPS Security expert Guido Vranken has published a paper on an attack that can successfully extract meaningful information from a captured TLS traffic session. Although the so-called HTTPS Bicycle
16%
Thrashing the data cache for fun and profit
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Lucy Baldwin, 123RF.com
; i < SIZE; i++) for (int j = 0; j < SIZE; j++) array[j][i]++; return 0; } Both listings do exactly the same thing, proceeding in what is called row-major (Listing 1) or column
16%
A DIY HTML Engine
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Luca Bertolli, 123RF.com
that can be called in any file within the purview of the project definition. Simply define anything (e.g., name: linuxmagazine ), and you can use the variable (name in this example) without having
16%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
host takeover." In cybersecurity parlance, the type of offensive testing I'll undertake in this article is called application security (AppSec) testing. (Please see the "Caution!" box.) Caution
16%
SmartOS as a virtualization platform
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Paulus NR, 123RF.com
with very little overhead (Figure 1). Figure 1: A flame graph created with DTrace visualizes the call stack for MySQL. Although Linux has similar tools
16%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
to the correct binary log. The logfiles usually reside in /var/log/sa or /var/log/sysstat (Ubuntu) and always go by the name sa
, where dd is the day of the month. The script is usually called every 10 minutes
16%
News for Admins
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
 
Scientists at Purdue University say they are "among the first" to build what they are calling "a transistor-like gate for quantum information processing." The gate, which could play a role within a quantum
16%
News for Admins
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
 
-winning human rights activist Ahmed Mansoor. According to reports, the UAE government was using a spyware tool called Pegasus to attack Mansoor. Pegasus is developed and sold by Israel-based cyber-arms dealer
16%
Malware analysis in the sandbox
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Rostislav Zatonskiy, 123RF.com
's interaction with the operating system: Which system functions does the program call with which parameters? Which files does it read from or write to? Which keys in the Windows registry does the program access
16%
A REST API automation strategy for DevOps
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image by Alex Kotliarskyi on Unsplash
to delivering optimized applications, which calls for a state-of-the-art automation strategy that aligns communication and collaboration across these interfaces. Of importance, however, is the degree

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice