Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%2012%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (203)
  • News (35)
  • Article (15)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 26 Next »

95%
Managing BitLocker with PowerShell
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © sergey Mayorov, 123RF.com
2022
95%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
2022
95%
Configuring X Window input and output devices
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ilya lix on Unsplash
An X Window System provides several components to allow users to interact with a graphical interface. An X server lets applications, also known as X clients, use a graphical display within windows ... Two command-line tools, xandr and xinput, let you optimize your X Window display from the terminal. ... Optimizing X Window Displays ... Configuring X Window input and output devices ... 2022
95%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
in and whether I have tried logging in near Berlin, Germany, on my Intel Mac OS X 10.15 device. Incidentally, Google's approach has inspired a number of other tech giants. Netflix also says that it now uses ... 2022
95%
Fedora 35 Server (Install)
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
2022
95%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
in Figure 2, it lists all the factors that have been checked, along with a checkmark for passed or an X for failed. Figure 2: A detailed view of all factors ... 2022
95%
Technology Conferences – We Need Each Other
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © vska, 123RF.com
in our own jobs. We can ponder the "what ifs" and hypothetical situations together. We can also learn from each other. "Hey, how do you deal with X?" is always a good conversation starter. Maybe it's just ... 2022
95%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
virtualization extensions, extended page tables, and a Windows hypervisor. Secure boot Trusted Platform Module (TPM) 2.0 (recommended) Unified Extensible Firmware Interface (UEFI) lock (recommended ... 2022
95%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
2022
95%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
,32 1,33 2,34 3,35 4,36 5,37 6,38 7,39 8,40 9,41 10,42 11,43 12,44 13,45 14,46 15,47 16,48 17,49 18,50 19,51 20,52 21,53 22,54 23,55 24,56 25,57 26,58 27,59 28,60 29,61 30,62 31,63 The lstopo tool ... 2022

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice