Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 98 Next »

8%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
, such as CPU, memory, and time, to encrypt the file. If you want to encrypt the file and very rarely decrypt it, you might want to use an algorithm with a very long hash key. If you're going to be decrypting
8%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
Sleuth Kit [12] are also useful for Android. Each operating system stores its configuration details in a typical form; Linux uses readable configuration files, Windows uses the Registry, and Android
8%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
), when you had to transfer large host files from node to node. PowerDNS is notably in use at some of the largest ISPs and websites in the world, such as AOL, Shaw Cable, and even Wikipedia. Its compact
8%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
is wrong – in this case, the WAP has failed to reach its ADFS server. command returns a list of the 170 cmdlets in ADFS 2016, some of which are useful for monitoring or just to see what's going on ... Problems with ADFS trusts can affect network access for Office 365 or associated partner companies. Fortunately, administrators have various monitoring options.
8%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
number of services visible within the AWS Console is simply staggering, which is why AWS is still the dominant cloud provider – admittedly with Google Cloud and Microsoft Azure hot on its heels
8%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
and reattach to the screen  session in that new terminal. As you will see in a subsequent section, you can even SSH from a remote system into the system in which you started the screen  session and attach to it
8%
Tools that extend Bash scripting
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Laschon Maximilian, 123RF.com
for user interaction, or for information. Although I still cling to my command-line interface, sometimes it's easier to click on buttons or enter information in boxes than to memorize the options for certain
8%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
security to the forefront. I argue that this topic always should be under discussion because data security, including encryption, is an important topic for everyone, even if it’s just your laptop. Now, many
8%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
this code, I’ll be a little naive and just use the data copy  directive to copy the data from the CPU to the GPU and back (Table 6). Notice that each kernel parallel loop  directive has its own data copy
8%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
compared with barcode and other traditional methods, but it comes with its own problems. In this article, I look at various tech-based approaches to RFID asset tracking in the IT environment. After doing so

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice