Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 凭手机号怎么查身份证号-(⏭查询网站gpio17.com⏮)-身份证号查新办手机号怎么办-公安局身份证号查手机号码-查手机身份证号按什么后果-(⏭查询网站gpio17.com⏮)-查身份证有几个手机gw ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (797)
  • Article (71)
  • News (8)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 88 Next »

80%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
installations of their intrusion detection system (IDS) and security information and event management (SIEM) tools. Not using a 24/7 monitoring company. Interestingly, most of these organizations had good
80%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
Profile on a variation of the MD code. Listing 2 cProfile Output Thu Nov 7 08:09:57 2019 12791143 function calls (12788375 primitive calls) in 156.745 seconds Ordered by: cumulative time ncalls
80%
Five graphical database front ends
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © yewkeo, 123RF.com
Office [6] and OpenOffice [7]. It is not uncommon for Base to end up automatically on your drive when you install these office suites. If not, you can usually install manually from the package sources. When
80%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
Features Feature ReadyDATA Model ReadyDATA 5200 Manufacturer Netgear Operating system NexentaOS (based on Solaris) Price EUR 7
80%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
. Therefore, if you want to use the TICK Stack, you at least need a minimal Telegraf-InfluxDB-Kapacitor (TIK) setup. Colorful Chronograf The "C" in TICK Stack also plays a role: The Chronograf tool [7
80%
Useful tools for automating network devices
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
© Sila Nimkittikul, 123RF.com
. The manufacturer provides all of the Chef components online [7]. Cisco and Juniper have taken care to ensure integration with the popular automation frameworks by virtue of their widespread distribution of devices
80%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
for many years, Red Hat has largely withdrawn from the GlusterFS project and is set to discontinue support for GlusterFS at the end of 2024. TopoLVM Much like Hostpath, TopoLVM [7] is another single
80%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
SCOM, setting up tier-specific distributed monitoring is somewhat more complex and requires you to create at least three management groups (MGs) [7] (Connected MG, Tier 1, and Tier 0), each
80%
Sync identities with Microsoft Identity Manager
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © alphaspirit, 123RF.com
, you can press the Script button to create a VBScript, which – when wrapped in a batch file and handed over to the scheduling service – ensures that regular synchronization runs [7]. This is quite
80%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
in the directory service. Defender Exploit Guard Defender Exploit Guard (WDEG) [7] is provided by Microsoft starting with Windows version 1709. WDEG provides a set of host intrusion prevention features

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 88 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice