Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 98 Next »

8%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
of information: expect "$ " Finally, send the exit command to the remote system to log out. Don’t forget that hard return (\r ): send "exit\r" The script in its entirety looks as follows: #!/usr
8%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
Tracker: http://www.bestpractical.com/rt/ ITIL Service Transition: http://wiki.en.it-processmaps.com/index.php/ITIL_Service_Transition iTop: http://www.combodo.com/spip.php?page=rubrique&id_rubrique=8
8%
Tinkerbell bare metal deployment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by engin akyurt on Unsplash
enables bare metal management beyond the capabilities of other tools. Infos Tinkerbell: https://github.com/tinkerbell Rufio: https://pkg.go.dev/github.com/tinkerbell/rufio Quick start
8%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
is not necessarily secure just because its provider has a certificate hanging on the wall. Certificates merely confirm that companies have implemented processes that reduce the likelihood of serious problems. Tools
8%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
segmentation), and intrusion detection and prevention systems. However, even admins that can tick each of these boxes are not automatically safe and can see their companies fall victim to hackers. If you
8%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
. The Remote Desktop Manager Plugin extension lets you use credentials for Microsoft Remote Desktop Manager. I will go into more detail about plugins in a separate section
8%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
containers. ISE can be deployed on a variety of platforms. For example, the vendor supports implementations on hypervisors such as VMware ESXi, KVM, and Hyper-V. The environments supported depend in each case
8%
Open source customer relationship management software
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Martina Berg, Fotolia.com
to the market in 1999. SuiteCRM is a very powerful business toolkit. Beneath its mild and perhaps slightly antiquated user interface is hidden a powerhouse of business automation and management tools. Suite
8%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
. It remains to be seen whether Microsoft is willing to complete its subsystem. Infos Windows Subsystem for Linux documentation: https://msdn.microsoft.com/de-de/commandline/wsl/about Cygwin
8%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
the machine starts so that software can be pulled from it. To avoid having to enter access data each time, you can save the data in the ~/.vagrant.d/Vagrantfile file. The service manager plugin helps explore

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice