Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (465)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 56 Next »

8%
Thrashing the data cache for fun and profit
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Lucy Baldwin, 123RF.com
= 0; j < SIZE; j++) array[i][j]++; return 0; } Listing 2 column.c #include #define SIZE 10000 ** int array[SIZE][SIZE] = {0}; int main() { for (int i = 0
8%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
. Figure 1: E2E monitoring observes the users (real user monitoring) and regularly simulates typical user actions (synthetic monitoring). The information and performance values obtained in this way
8%
RESTful APIs in practice
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Michal Bednarek, 123RF.com
are available for both variants. Listing 4 Demo Account Query with Ruby 01 require "figo" 02 03 session = Figo::Session.new("ASHWLIkouP2O6_bgA2wWReRhletgWKHYjLqDaqb0LFfamim9RjexTo22uj ... Internet providers often market their open interfaces as RESTful, but is this true of the APIs, especially when no standard exists? We introduce some REST providers and look at how closely their API ... REST Hands-On
8%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
.owasp.org/index.php/Certificate_and_Public_Key_Pinning "EMET 4.0's Certificate Trust feature" by Elia Florio: https://blogs.technet.microsoft.com/srd/2013/05/08/emet-4-0s-certificate-trust-feature RFC 7469: Public Key Pinning extension for HTTP: https ... HTTPS protects a connection from both tapping and manipulation, but only if a man in the middle hasn't already infiltrated the Internet connection. We highlight the weaknesses in HTTPS
8%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
with the active share, allowing traffic to be recorded on the Kali computer, even though the data is running back and forth between Target 2 and Target 1 and the Kali computer is not involved – a typical MITM case
8%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
these services on the Internet. NetScaler also provides load balancing and Layer 4 connection management, content filtering, and URL filtering and rewriting (Figure 2). Additionally, NetScaler offers network ... Since Microsoft announced the discontinuation of its Threat Management Gateway (TMG) – successor to the Internet Security and Acceleration (ISA) Server – companies have been looking for an adequate
8%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
Code 11111111112222222222 12345678901234567890123456789 ----------------------------- SUM = 0.0 D0 100 I=1,10 SUM = SUM + REAL(I) 100 CONTINUE ... Y = X1 + X2
8%
Routing with Quagga
19.02.2013
Home »  Articles  » 
Linux clients, three software-simulated Cisco routers, and the Linux server with Quagga. In the example network, two paths lead from the 1.2.3.0/24 network on the left to the 172.16.1.0/24 network
8%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
STATUS RESTARTS AGE kube-system coredns-d798c9dd-h25s2 0/1 Running 0 10m kube-system metrics-server-6d684c7b5-b2r8w 0/1 CrashLoopBackOff 6 ... The k3s lightweight and secure Kubernetes distribution can handle both unattended workloads in remote locations with minimal resources and clusters of IoT appliances. ... Kubernetes k3s lightweight distro
8%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
Most Internet services rely on the Transmission Control Protocol (TCP), an interprocess communication protocol that dates back to the 1980s, an era when data streams were more like trickles by today

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice