Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mb 100 Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • Article (22)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 Next »

13%
Save money with Samba as the domain controller on a legacy Windows NT-style domain
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Bernad, fotolia.com
-a -u administrator -G 512 -c "[UX]" new password: retype new password: Unix username: administrator NT username: Account Flags: [U ] User SID: S-1-5-21-2851015207-2192045402-886076809-1000
13%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
Options.ListenAnyIP(4711, 08 listenOptions => { 09 listenOptions.UseHttps("cert.pfx", ""); 10 } 11 ); 12 }) 13 .UseStaticWebAssets() 14 .Use
13%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
classifies each pair into self-defined optimization categories. Category 0 means it cannot be optimized. Category 1 means it can easily be optimized. Category 2 means that although one or more other
13%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
relative to the data values. For example, if the difference between two numbers is 100.0, but you are working with values of 10^8, then the difference (0.001%) might not be important. It’s really up
13%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
 = np.random.rand(nx,ny)*100.0   # Random data in arrayy       np.save(filename, a) # Write data to file       print("    Just finished writing file, ",filename,".npy") # end for The code in Listing 2 reads the five files
13%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
. Listing 4 Server with Graphics 01 using HTTP, JSON, Plots, Base64 02 const PORT = 8660 03 04 function startserver() 05 io = IOBuffer(); 06 x = 0.0:2PI/1000:2PI 07 WebSockets.listen("127.0.0
13%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
(KafkaProducerString, producer = new KafkaProducer(props)) { 03 04 for (long i =**0; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
13%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
and lets you know of changes or foul play on the data link layer. P0f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
13%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator client runs on Android, iOS, and BlackBerry devices
13%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
experts recommend enabling PHS – at least as an additional authentication procedure. The frequently cited angst prompted by synchronizing passwords with the cloud is unfounded, because hashing more than 1,000

« Previous 1 ... 4 5 6 7 8 9 10 11 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice