Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00s Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (362)
  • Article (128)
  • News (6)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 Next »

17%
HTML to database with a Perl script
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Danila Krylov, 123RF.com
_text) { 066 $split_text[$split_text_count] =~ s/\n+//g; 067 $this_split = $split_text[$split_text_count]; 068 $this_split =~ s/[ ]+//g; 069 if ($this_split != "") { 070 $query
17%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ... support to its Windows Vista and Windows Server platforms in 2007. Linux in all its variants and Apple’s Mac OS X followed suit; thus, the new protocol spread with each new installation. On all ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your
17%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
data not covered by CMMC is secret (S), top secret (TS), or top secret sensitive compartmented information (TS-SCI). Within the unclassified data and information category of material are distinct
17%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
(Listing 1), which indicates a push. Listing 1 Server Push in Log 2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0" 2020-11-22T12:01:10+01:00 1606042870.567 200
17%
Build operating system images on demand
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Nataliya Hora, 123RF.com
too much manual intervention. Quite remarkably, FAI was created back in the late 1990s, long before automation tools such as Puppet or Ansible existed. FAI offered the ability to roll out an OS
17%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
)-[:Reviewed " + 52 "{name: 'reviewed'}]-(%s)\n", 53 rev, prod) 54 } 55 } 56 cmd += ";" 57 toNeo4j(cmd) 58 } 59 60 func toNeo4j(cmd string) { 61 db, err := sql.Open("neo4j-cypher", 62
17%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
: default modify PATH variable: yes 1) Proceed with installation (default) 2) Customize installation 3) Cancel installation >1 info: profile set to 'default' info: default host triple is x86_64-unknown
17%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
-a9c7-1c7ef74a9ba4 Blocks the use of copied or imitated system tools (preview) No c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb Blocks web shell creation for servers
17%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
(2018-04-26): OK - Certificate is trusted Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate Received Chain: www.devsecops.cc --> Let's Encrypt Authority X3
17%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
and easily with the ping scan method (-sP; Listing 1). Figure 3: The PCoIP host card (left) and zero client (right) are managed via an easy-to-use, web

« Previous 1 ... 42 43 44 45 46 47 48 49 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice