Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1077)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 146 Next »

24%
FreeRADIUS for WiFi hotspots
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Tyler Olson, 123RF.com
). Figure 1: Some hotspots support a user-specific configuration with WPA Enterprise. In most cases, the user database is not managed by the hotspot itself. Instead, the hotspot queries a RADIUS server
24%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
. In the simplest case, it is now possible to embed Lua code directly in the configuration files using the content_by_lua keyword: content_by_lua ' ngx.say("test") '; Lua also handles request rewrites
24%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
a cloud. No matter how you design your configuration, Cloudify needs to operate through a master VM. In the case of a local cloud, the master VM runs on the local machine. Cloudify handles the complete
24%
Zabbix release 2.2
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © bowie15, 123RF.com
also sends email, text, or instant messages in the case of an incident. As the storage back end for the collected information, as well as for the configuration data of the monitored hosts, you can choose
24%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
without actually having to publish ports on the Internet. If neither ExpressRoute nor VPN are available, as might be the case in a test environment, enable remote access only as long as you need
24%
Linux alternatives to Windows software
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
the same variety of programs as Windows, but the exact opposite is the case. On Windows, neither an office suite nor a usable media player exists after installing the operating system – meanwhile, out
24%
Professional PowerShell environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © lightwise, 123RF.com
the state of a reaction. The benefits are obvious: The error case is described and documented. The subsequent actions can be created flexibly and are traceable. The cost of this architecture is a small
24%
Desktops and applications with Essentials
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © krisckam, 123RF.com
, too, the costs for hardware, operating system, and operating and management costs are added. Citrix provides a very good cost calculator [2] to help you compare costs for a business case. The First
24%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
available for Android and iOS devices. In addition to access via smartphones and tablets, you can evaluate data from a browser. In this case, communication between the end device and the SQL server occurs
24%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
from eth* for the NICs in your own udev rules, such as net0 or wan1. As is often the case in the open source world, alternatives to the persistent network rules have been developed by different parties

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice