Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (141)
  • Article (45)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

7%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
tool. Enter GlusterFS (Figures 3 and 4). Figure 3: Internally, RHSS relies on Gluster software, and you can use many Gluster commands for storage
7%
Regular expressions and metacharacters in PowerShell
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by JJ Ying on Unsplash.com
4 but less than 8 letters!" Once the user has entered a value, you can check the input for correctness with the following regular expression (Figure 2): > $input -match "^\d{3}\w{4,8
7%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
on the Rex host and then copy the public key over to the client (Listing 3). After that, a test login on the client without password should work. Listing 3 Key-Based Authentication 01 root
7%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
, as in Python [3] or Node [4]. Recent books have been published about writing shell commands in Rust [5], Python [6], Node.js [7], and even Go [8], and it is into this last language's interesting performance
7%
John the Ripper
22.08.2011
Home »  Articles  » 
 
BSD MD5 [32/64 X2]... DONE Raw: 10995 c/s real, 10995 c/s virtual Benchmarking: OpenBSD Blowfish (x32) [32/64 X2]... DONE Raw: 723 c/s real, 723 c/s virtual Benchmarking: Kerberos AFS DES [48/64 4K
7%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
\ \([0-9]\+\)x\([0-9]\+\).*$/\1 \2 \3 \4 \5/p' )" 46 : connected_displays: ${connected_displays[@]} 47 : display_list: "$display_list" 48 49 if [[ -z "$display_list" ]] ; then 50 die "Could not find
7%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
interacts with the environment as an agent, much like a sentient being (Figure 3). The agent has to explore the environment and typically only learns after a certain number of actions whether
7%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
, and after the developers set up Chrome with Brotli support, other browser manufacturers followed suit. Today, Brotli supports all major browsers [3]. Brotli on the Server Side Things look less rosy
7%
Tips and Tricks for Containers
12.05.2020
Home »  HPC  »  Articles  » 
           TAG                     IMAGE ID            CREATED             SIZE nvidia/cuda          10.1-base-ubuntu18.04   3b55548ae91f        4 months ago        106MB hello-world          latest                  fce289e99eb9        16 months ago       1.84kB Running the nvidia
7%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
PCM 48, 56, 64 G.723.1 MP-MLQ/ACELP 5.3, 6.3 H.728 LD-CELP 16 G.729 CS-ACELP 8 G.729 annex A CS-ACELP 8

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice