Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 132 Next »

15%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
their logs under C:\Inetpub\Wwwroot logs\LogFiles\W3SVC1. Call up the Log File Manager in Log Parser Studio by clicking on the fifth icon from the left. The manager opens in a separate dialog. Now, you can
15%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
. The most popular distributions that follow the lean approach are CirrOS [1], Alpine [2], JeOS (just enough operating system) [3], and the operating system formerly known as CoreOS [4], now called Container
15%
Monitor Active Directory with Azure AD Connect Health
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © skaisbon, photocase.com
the configuration relies on Internet servers, advanced security for Internet Explorer is enabled. You need to allow the following URLs to be able to call the respective administration pages: https
15%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
be easily integrated into the virtual private cloud (VPC) networks of some cloud providers. For more complex networks, Kubernetes supports a concept called container network interface (CNI) that allows
15%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
) bucket (Figure 11). Figure 11: Phishing for privileges. The compromised user is part of a group called devOps : $ aws iam list-groups-for-user --user
15%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
, the QUIC header has a header length field in the connection information. Figure 1: The Wireshark output of a call to cloudflare.com in Google Chrome without
15%
The state of OpenStack in 2022
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by vadim kaipov on Unsplash
enough to warrant a special changelog entry. The developers themselves would probably not call the Keystone feature complete, but the intent is to protect admins against too many changes in Keystone
15%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
\\.168\\.0\\.1" Another option caches rules in the YAML file: rules: cache: true The documentation says that if you do not want Teler to look up what it calls "external resources" each time it runs, you should enable
15%
Automation with Chef
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Pablo Bustos on Unsplash
Chef has been around since 2009 and is one of the most popular systems for configuration management. Originally the company was called Opscode, but it later changed its name to Chef. Since the end
15%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
The Hypertext Transfer Protocol (HTTP) no longer just serves as the basis for calling up web pages, it is also the basis for a wide range of applications. The best known version, which is still used

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice