Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (301)
  • Article (57)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 37 Next »

71%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
] analyzed the effect of measurement on performance through clever experiments that determined the effect of time measurement on the code measured. Using well-placed calls to timespec_get [8] and a detailed
71%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
The object ID (1c9c09d7-4b3c-4f37-b2cf-e3b8ad0a2ecf in this example) can then be used to search for audit entries: Get-AzureADAuditDirectoryLogs -Filter "targetResources/any (tr:tr/id eq '1c9c09d7-4b3c-4f37
71%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
a family of wasps [2]. Although I'm a fan of Mutillidae, other applications like WebGoat [3], also from OWASP, offer a highly sophisticated and multilayered insecure web application, as well. The most
70%
RESTful APIs in practice
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Michal Bednarek, 123RF.com
. Figure 1: Once you have registered to use the Twitter API, you are taken to this configuration page. The numerous libraries [8] help you develop a client and make it significantly easier to program
70%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
api.raml 01 #%Raml 0.8 02 title: Contacts 03 version: 0.1 04 #baseUri: http://www.rve.com/contactshelf 05 baseUri: https://mocksvc.mulesoft.com/mocks/d4c4356f-0508-4277-9060-00ab6dd36e9b
70%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
kind: Service 03 metadata: 04 name: nginx 05 spec: 06 ports: 07 - port: 8080 08 targetPort: 80 09 selector: 10 app: nginx Listing 7 my-k8s-app/webapp-service.yaml 01
70%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
] are impressive, although Node.js, Ruby, Golang, Java, PHP, and other languages can be expected to achieve similar results. Listing 1 Python Minify Results from ubuntu:14.04 - 438MB => 16.8MB
70%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
_session_timeout 60m; 06 # Only with Nginx 1.4.x and newer 07 ssl_stapling on; 08 09 # HSTS policies are persistent; learn more about HSTS 10 # before enabling the following rule for best security. 10 #add
70%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
://addons.mozilla.org/de/thunderbird/addon/lightning/ Sogo for Lightning: http://www.sogo.nu/fr/downloads/frontends.html Evolution: http://projects.gnome.org/evolution/ Evolution with SabreDAV: http://sabre.io/dav/clients/evolution/ eM Client: http://www.emclient.com
70%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
Rudis. Data-Driven Security: Analysis, Visualization and Dashboards . Wiley, 2014 toolsmith – Jay and Bob Strike Back: Data-Driven Security: http://holisticinfosec.blogspot.com/2014/09/toolsmith

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice