Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 132 Next »

15%
Handy Windows tools for sniffing network traffic
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Barna Tanko, 123RF.com
you can call in for more advanced analysis. Whereas SmartSniff records networks and packets much like Wireshark, SniffPass investigates the transmission of unencrypted passwords. Open Visual Traceroute
15%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
time, which the two configuration files in Listing 1 (Upstart) and Listing 2 (systemd) do for you. A call to nginx -t checks the configuration before the server process starts. If an error occurs, nginx
15%
Network traffic utilities bandwhich and iftop
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Ildar Galeev, 123RF.com
-resolution: no port-resolution: yes show-bars: yes port-display: on sort: 2s If you call your tweaked options file simply config, you can execute it with the -c switch: $ iftop -i wlp1s0 -c config Note
15%
Privileged Identity Management in Azure AD
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © lassedesignen, 123RF.com
into the wrong hands or from accidental misadministration. Of primary importance is the use of separate accounts – accounts that are not used in daily work, such as email, phone calls, or internet searches
15%
Test JavaScript programs with Karma
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image Photo by Pierre Bamin on Unsplash
results and return them in the desired format. In the simplest case, the reporter displays progress as a message on the command line. On Call The developers recommend installing Karma and all necessary
15%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
email address to determine if any of your online identities have been compromised. Okta has provided a useful Chrome app called PassProtect [2] that uses information from the Have I Been Pwned database
15%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
and choose a subscription: > Login-AzureRMAccount > Select-AzureRmSubscription -Name "Test-Subscription" You call the NSGs of a resource group as follows: > Get-AzureRmNetworkSecurityGroup -Resource
15%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
window.onerror, thus usually stopping the program. jQuery 3 converts the exception into a rejection for such cases and then calls a stored callback function. Listing 1 illustrates this with a simple
15%
Discover ransomware with PowerShell
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Andrea Danti, 123RF.com
List } 033 else 034 { $Temp = "The file " + $FileList + " already exists, default is to not overwrite. Please manually delete and call tool again if needed!" 035 write
15%
Professional PowerShell environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © lightwise, 123RF.com
that constantly checks for the consequences of an error is imperative. The control command is called permanently – whether it was necessary or not is decided in the follow-up. The alternative is to describe

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice