Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 98 Next »

8%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
Within a couple of hours, an experienced Internet attack specialist can bring your server infrastructure to its knees. In many cases, the barn door through which the attackers gain entry
8%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
such as AWS Lambda. For example, when you create a Lambda function (source code and a run-time configuration) and execute it, the AWS platform only bills you for the execution time, also called the "compute
8%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
, it is recommended that you use the Core installation of Windows Server 2019 or newer for Hyper-V hosts, which will help you prevent attacks on the desktop and the programs installed on it. Bear in mind
8%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
the destination address in its MAC address table. The destination is found, and the data frame is sent out through port 8. When a network contains two or more switches, each switch maintains its own MAC
8%
Optimizing Windows 10 for SSDs
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Sergiy Serdyuk, 123RF.com
to the driver for the controller and invoke its properties. 3. Switch to the Driver tab. 4. Click on Driver Details . 5. Load the driver with "ahci" in its name
8%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
based. For example, the third version of the Hypertext Transport Protocol (HTTP/3) uses QUIC. The first drafts of the Session Initiation Protocol (SIP) successor Real-Time Internet Peering for Telephony
8%
Spam protection using SpamAssassin
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
users and administrators can modify these rules. The Bayes filter – a key component of SpamAssassin – then uses its own database with statistical data from previously processed spam and ad-free email
8%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
proved helpful for researchers and developers interested in distributed systems and database management and inspiring solutions such as CockroachDB. One of the key features of CockroachDB is its
8%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
to each other, or to a standard atomic clock (or close to it), or both. With clocks in sync, the many tools and libraries on clusters such as MPI will function correctly. On Rocky Linux 8, I use chrony [2
8%
Automate the Active Directory Federation Services install
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © drubig-photo, fotolia.com
/en-us/library/dn479343.aspx Microsoft Online Services sign-in wizard: https://www.microsoft.com/en-us/download/details.aspx?id=41950 Azure Active Directory module for PowerShell: http://go.microsoft.com

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice