Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 132 Next »

15%
Managing access credentials
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Marcel Goldbach, photocase.com
in the archive can only be accessed after completing these steps. From now on, if you call up a website that has access credentials stored in the Buttercup archive, the software will automatically fill the fields
15%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
exist, but as you will see later, there are even more than that. CyberArk has released an open source tool called SkyArk [2] with which you can scan Azure and AWS environments and identify shadow admin
15%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
language to define this resource. Chef uses the Ruby programming language to define its templates. Chef calls these templates, “Recipes.” Chef uses Python to create these recipes. It calls its Python
15%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
container images trim. A sophisticated piece of open source software allows you to do just that; it's called DockerSlim [1]. The clever tool also makes a welcome foray into further securing your container
15%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
system virtualization. In full virtualization, a system has a host operating system (OS) that runs something called a hypervisor (Figure 1, right side). The hypervisor is capable of communicating directly
15%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
frameworks, including TensorFlow, PyTorch, and JAX. Fundamentally, Keras abstracts away the details of the back-end frameworks so that you call functions from Keras to build and train models. The application
15%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
at the end. I'll also just look at the more obvious routes to exploitation (security level 0) to leave the good stuff for you to try later. The first vulnerability is called directory traversal, which can
15%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
to install the software on the Ubuntu client and the two storage servers. For the installation on CentOS, I added the EPEL repository [7] and called yum update. Version 3.8.5 of the software then installed
15%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
resides in a pool, which may contain one or more groups of devices called vdevs. The possible types of vdev are individual disks, mirrors, RAID-Z1, RAID-Z2, and RAID-Z3 sets. All of the component groups
15%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
directly into Pandas data structures: read_csv() , read_table() , and read_fwf() . Figure 1 shows an example of a session with the advanced Python shell, IPython, and a call to read_csv() ; Figure 2 shows

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice