Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12%390 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (353)
  • Article (115)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 51 Next »

11%
Millions of Customers Affected in Capital One Data Breach 
30.07.2019
Home »  News  » 
 
News, “The data breach that occurred on March 22nd and 23rd this year allowed attackers to steal information of customers who had applied for a credit card between 2005 and 2019.” Capital One had
11%
Modularize websites with Web Components
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Prokhorov, fotolia.com
12 Yes (untested) MS Edge 42 No For example, developers can use Web Components to integrate microservices into web pages without diluting HTML documents
11%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
since version 2007, which is the basic prerequisite for using the corresponding API. In addition, you need the Exchange Web Services Managed API 2.2 [1]. If you only use Exchange locally, the EWS API
11%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
, you should see the client config file ssh_config, which I'll get to a little later. If you've just installed the SSH server and want to be sure that it's listening, you can use the command lsof -i :22
11%
Mounting Compressed Archives as a User
25.01.2022
Home »  HPC  »  Articles  » 
_TEST                    272 iozone                  4 reiser4_defaults.txt.gz    4 CFQ                            12 iozone_notes.txt        4 reiser4_notes.txt.gz    4 CFQ_TUNING                      4 LVM
11%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
 loop /snap/core22/864 loop15   7:15   0  12.3M  1 loop /snap/snap-store/959 loop16   7:16   0  73.9M  1 loop /snap/core22/817 loop17   7:17   0 349.7M  1 loop /snap/gnome-3-38-2004/140 loop18
11%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
11%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
6), and start stream blocking (line 7), which executes the command and waits for the response. Now, write the output to a variable (lines 9-12), close the stream (line 14), and send the response
11%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
then provides machines with the correct metadata, depending on the requirement. Listing 1 Show Nodes $ kubectl get nodes NAME STATUS AGE VERSION 10.126.22
11%
A web application with MongoDB and Bottle
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Egor Arkhipov, 123RF.com
>My little Bottle example 06 07 08 09

Hi World..here is my little survey!

10 11 12 What is your favorite club?
13

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 51 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice