Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 凭手机号怎么查身份证号-(⏭查询网站gpio17.com⏮)-身份证号查新办手机号怎么办-公安局身份证号查手机号码-查手机身份证号按什么后果-(⏭查询网站gpio17.com⏮)-查身份证有几个手机gw ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (976)
  • Article (71)
  • News (8)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 106 Next »

81%
End-to-end monitoring – Measuring what the user perceives
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © complize, photocase.com
as the Robot Integrated Development Environment (RIDE) [7], which allows for additional features such as code completion, simplified keyword management, and much more. The Alyvix installer automatically provides
81%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
as a PIN, but several PINs may also be required to recover the secret key to decrypt the data. Clevis uses the Shamir's Secret Sharing (SSS) algorithm [7] developed by Adi Shamir, one of the founders
81%
Call web pages in the terminal with Browsh
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © yemelyanov, 123RF.com
://html.brow.sh/ and call the complete construct in a normal web browser: https://html.brow.sh/http://www.linux-magazine.com/ After a few seconds, you will see the corresponding website as Browsh would display it (Figure 2
81%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
. Finally, mandatory internal and external requirements, such as the Sarbanes-Oxley Act (SOX) [5], PCI-DSS [6], ISO 27001 [7], and Basel II [8], ensure technical and organizational compliance. Ultimately
81%
Security compliance with OpenSCAP
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitriy Pchelintsev, 123RF.com
only use the XCCDF profile file here for test purposes. However, Linux distributors are not being forthcoming with profiles thus far and rely on content providers such as DISA or NIST [7]. Instead
81%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
SCSI target implementation is fairly simple. Two steps are all it takes to make the logical unit accessible on the IP SAN: # svcadm enable iscsi/target # itadm create-target Target iqn.1986-03.com.sun:02:8f4
81%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
here, click on List zones (Figure 7) and then Edit an existing example.com zone, as in Figure 8. Figure 5: Poweradmin management web GUI
81%
Angular 2 client-side TypeScript framework
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
on a development machine with Debian 8: curl -sL https://deb.nodesource.com/ setup_6.x | bash apt install nodejs git The first command expands the collection of repositories for Debian's package manager, adding
81%
Identity and access management with OpenIAM
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Chatree Jaiyangyuen, 123rf.com
OS 8, but earlier versions of the RPM package before 4.1.6 only run on Red Hat Enterprise Linux 7 or CentOS 7. It is somewhat unusual that the RPM only packages the OpenIAM sources as a tarball, which
81%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
. The STA will be run on those big virtual switches to determine the state of the interregion connected ports. In Figure 7, the network is grouped into three regions. The concept is similar to the autonomous

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice