Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1077)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 146 Next »

25%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
(Figure 8). Figure 8: Session cookie expiration setting. In this case, however, the cookie expiration isn't for a year after the first login – meaning
25%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
, even if that is not the case. Despite this problem, geo-replication is a useful feature for preventing disaster scenarios. People disagree on the crucial issue of whether colorful GUIs are necessary
25%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
immediately on the phone or by email. Ideally, help desk staff should handle 80 to 90 percent of all requests themselves and pass on only the really tough cases to the specialists. The success rate depends
25%
Seeing Through a Web Darkly
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © phive2015, 123RF.com
or service sales actually have sophisticated (in most cases) e-commerce capability. Before taking your dark journey, you have to download and install a special piece of software called The Onion Router (Tor
25%
Storage cluster management with LINSTOR
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © sdecoret, 123RF.com
an entire cluster centrally, and not just a single system, is added, it is clear that a few rough-and-ready scripts are not up to the task. Three Components In these cases, LINSTOR [1] from LINBIT enters
25%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
. In the worst case, you could find yourself on the wrong end of a lawsuit if the question of gross negligence is raised. None of that changes in the cloud. Admittedly, unlike conventional setups, the challenge
25%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
. However, for the web application vendor this involves much work: They not only need to develop the documentation and the library but also update both in case of any interface changes. A miracle tool named
25%
NVDIMM and the Linux kernel
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Denis Dryashkin, 123RF.com
modules that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power
25%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
. In the case of RAM, overcommitting is prohibited from the outset: KVM offers this option, but under no circumstances does the admin want the out-of-memory killer of the Linux kernel to take down any virtual
25%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
is volatile storage that belongs to a specific VM and only exists as long as the VM exists, whereas volumes are persistent and can be connected to and disconnected from VMs at will. The normal case, as Amazon

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice