Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 通讯录的微信怎么查-(⏭查询网站gpios.com⏮)-可以查手机通讯录吗-别人欠款如何查通讯录-催款人怎么查通讯录-(⏭查询网站gpios.com⏮)-如何查手机一年前的通讯录6Q ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1166)
  • Article (82)
  • News (13)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 127 Next »

74%
Affordable hardware switch for SDN
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © plus69, 123RF.com
for the Zodiac FX, across four firmware generations of the switch and two service releases of OpenDaylight [4], the connection setup between switch and the OpenDaylight controller always got stuck in the same
74%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
SETTINGS% \ Temporary Internet Files \ Content.Word \ ~WRX- 4014.tmp. The dropped file is run via the Windows "CreateProcessA" function or the Windows Management Interface (WMI) COM interface. Executing via
74%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
focused. The Algorithms TutaCrypt [4] uses a combination of relatively new quantum-resistant algorithms and well-proven classical encryption to offer a hybrid protocol. The quantum
74%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
be protected by setting /proc/pid/oom_adj to -17 (OOM_DISABLE), by manipulating /proc/pid/oom_score_adj, or by configuring the Control Groups memory resource controller [4], depending on the kernel version
74%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
/tools/bgp-asn-4byte-converter/ Prefix hijacking: https://www.youtube.com/watch?v=IzLPKuAOe50 RFC7454: BGP Operations and Security: https://datatracker.ietf.org/doc/html/rfc7454 RPKI validation: https://www
74%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
past that – at least until 8.4 is released, which is scheduled to be the next LTS release. In any event, minor upgrades such as from 8.2.0 to 8.2.1, can be done several at a time. If, for example, you
74%
Asset tracking with RFID
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Vasiliy-Yakobchuk, 123RF.com
documents are difficult to find; however, you can find a list of the criteria that describe FSTC-compatible tags online [4]. These specifications include, among others, that: tags must be precoded
74%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
Your Own Device (BYOD) [4] technologies, have added additional complications, requiring the integration and management of devices that appear as if out of nowhere and then disappear again. At the same
74%
Provisioning resources with an Azure-specific language
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © vectortatu, 123RF.com
offers many options, which you can discover in the documentation [4]. Figure 2: Bicep output with parameters. Working with Modules Another advantage
74%
Manage Linux containers with Docker
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © 36clicks, 123RF.com
with the Docker Index [4], a repository of publicly available images. Not Everything Fits Docker is not suited to all use cases, though. Containers can't do everything that a full virtual machine can do

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 127 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice