Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 132 Next »

15%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
program called raspi-config (Figure 2). Navigating it is much like navigating the BIOS or ncurses application where you use the Up, Down, Right, and Left arrow keys and the Tab and Enter keys to navigate
15%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
corner of the browser window toolbar. To the left, you then call up the version history by clicking on Editing history . The software switches to the version view, which shows the timeline at the top
15%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
for video calls, Kopano Meet replaces the old WebMeeting module. The open source solution can be operated as a standalone utility in your private cloud, as well as on-premises and combined with your own
15%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
whether this works by calling ansible -i hosts infra -m ping If Ansible then announces that the connection is working, everything is set up correctly. Configure DHCP and TFTP Your next steps are to get
15%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
, the software calls up a wizard to carry out a basic configuration. The primary window then opens, looking a bit old-fashioned (Figure 1). Figure 1: The program
15%
Tool your HPC systems for data analytics
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Sergey Nivens, 123RF.com
that is trying to mature rapidly. As a result, many computations might be needed to arrive at some final information or answers. To get there, the computations are typically done in what is called a "pipeline
15%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
. The participating storage servers are simply called sheep in the project's jargon and are referenced as such in the documentation. Figure 1: Sheepdog architecture
15%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
by the not-for-profit organization called Open Web Application Security Project, or OWASP [2]. The ZAP security testing framework is regularly visible near the top of security tool review lists, thanks to its
15%
Manage logical volumes with GUI tools
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © grafner, 123RF.com
, but you can add it manually in Fedora 25 and 26. After installing, the Logical Volume Management (LVM) launcher is available in the System menu tree. It calls up a three-part window (Figure 2
15%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
), calling it 1:0 . Create a second HTB rule that will only be allowed a tiny amount of traffic and call it 1:5 . Use tc to create a filter and get it to match the MARK option set in step 1; then, watch

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice