Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 怎么查酒店开票信息-(⏭查询网站gpio17.com⏮)-要想查老公酒店入住信息-酒店查信息会告诉学校吗-个人查酒店入住信息查询-(⏭查询网站gpio17.com⏮)-酒店登录信息如何查kite ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (976)
  • Article (71)
  • News (8)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 106 Next »

81%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
VNC: http://www.tightvnc.com "Zap" Your App's Vulnerabilities: https://www.owasp.org/images/3/32/Owasp_zap_flyer_v2.pdf OSI Layer 7: https://en.wikipedia.org/wiki/OSI_model#Layer_7:_Application
81%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
Security X-Force in 2010 came to the conclusion that one third of all hypervisors suffer from vulnerability gaps [7]. Virtualizing a firewall on the same host as internal IT resources (e.g., domain
81%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
will need it for the next step. GuardDuty log format requires you to change the format for the timestamp (Figure 7). Figure 7: Parsing of Sumo Logic timestamp
81%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
tested the Windows client program up to Windows 7. The backup server must run Unix or Linux. Amanda refers to the backup server as the "Backup Server Host." The systems you are backing up are "Backup
81%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
or decryption of data. The ciphers supported in OpenSSH 7.3 are: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com
81%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
the encryption or decryption of data. The ciphers supported in OpenSSH 7.3 are: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256
81%
Red Hat Enterprise Linux 8 pre-series test
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image Photo by Filip Mroz on Unsplash
. In the past four years much has happened in terms of technology, and many new solutions have developed (e.g., Kubernetes). In RHEL 7, Docker and its support for Red Hat's container platform was not yet
81%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
vRealize Automation 7 Details Feature Information Product Software for managing and provisioning cloud infrastructures. Manufacturer VMWare (www.vmware.com ... VMware vRealize Automation 7 ... VMware vRealize Automation 7
81%
Boost performance of your Python programs
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Eric Isselée, 123RF
understanding of parallel computing [1]. I used the Ubuntu 9.10 x86_64 desktop distribution along with Python 2.7 to test the code in this article and to generate the screen shots. Breaking GIL and Extracting
81%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
.social-engineer.org/framework/general-discussion/social-engineering-defined "Using empathy to use people: Emotional intelligence and manipulation" by Jamil Zaki, November 7, 2013: https://blogs.scientificamerican.com/moral-universe

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice