Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: server 10s filed%2server. started inaccessible 04 windows 7 00s 04 for%2px ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (798)
  • Article (205)
  • News (5)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 Next »

12%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
Express Gen 2 one-lane (x1), 40-pin set of GPIO pins, camera connector, and so on. All of these connectors were linked to the chips on the Compute Module 4. The CM4 measured 55x40x4.7mm (i.e., about 2.1x1
12%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
, which means the backup system has access to the individual workstations and servers, but not vice versa. Above all, you must prevent users from modifying or deleting their own backups. The U.S. Computer
12%
Debugging Bash scripts automatically
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andre Zhak, 123RF.com
on the Oxygen 2 version from December 2017. Next, get the shell extension from the Eclipse Marketplace [2] and drag and drop the Install button to start the shell extension installation. Make sure you do
12%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
Nexus and OnePlus devices, as well as Samsung Galaxy S5 and S7, the HTC One M7 and 10, and two Sony Xperia devices. However, the mobile penetration testing system is far from capable of holding its own
12%
Azure AD and AD Domain Services for SMEs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Alessandro Erbetta on Unsplash
considered a tool needed only by huge company infrastructures, small Active Directory setups can now also be found in companies with around 10 or more employees. The problem is that an Active Directory setup
12%
Multifactor authentication with Google Authenticator
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © iofoto, Fotolia.com
that provide OTP tokens. One-time passwords come in several varieties (e.g., hardware, software, grid card). A popular, free, and simple way to implement two-factor authentication (2FA) with OTP is Google
12%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
,000 seconds. Amdahl's Law says the speedup is 1.00 (i.e., the starting point). Notice that as the number of processors increases, the wall clock time of the parallel portion decreases. The speedup a increases
12%
Interview with Cloud Foundry CEO Sam Ramji
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
could gather those engineers, put them into a single project of your choosing, and build big pieces of software. Awesome. That worked for the '70s, '80s, and '90s. In the 2000s, we started seeing
12%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
for alternatives to major leauge solutions. One good candidate, especially for smaller environments, is MicroK8s [2] from Canonical, void of bells and whistles. Another option might be K3s [3], which claims
12%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
on the MAC address of the interface) to create the interface ID or the privacy extensions as per RFC 4941 [2]. Alternatively, Windows uses a one-off randomized identifier. In any of these cases, the address

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice