Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (42)
  • Article (19)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

16%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
, and it lets users interact with the Windows desktop using multi-touch support. The interface offers an on-screen trackpad for mousing and provides a secure connection to Windows PC over WiFi or 3G. Text input ... 3
15%
New Products
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
at US$ 3,600 and includes free customer support and maintenance for the first year. Visit AlienVault for more details and additional pricing information: http
15%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
Code Example 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my
15%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
five-star reviews that look very similar. The problem is so evident on Amazon that customers rub their eyes in amazement wondering why the online giant doesn't intervene. Graph databases can help
15%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
to solve this dilemma. Compliance Undermined The US Department of Defense (DOD) Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) [3] also stipulate
15%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
and right. Unfortunately, my laptop has a 16:9 display with a resolution of 1,600x900 pixels. Common Denominator Some research on the topic of screen resolution reveals the root cause: the maximum
15%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
 /snap/snap-store/638 loop11   7:11   0   219M  1 loop /snap/gnome-3-34-1804/77 loop12   7:12   0 218.4M  1 loop /snap/gnome-3-34-1804/93 loop13   7:13   0  40.9M  1 loop /snap/snapd/20290 loop14   7:14   0  73.9M  1
15%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
approx. US$ 600 approx. US$ 335 CPU Via Eden X2/1GHz Via Eden X2/1GHz AMD G-T44R/1.2GHz AMD G-T56N/1.6GHz Marvell ARMADA PXA 510 v7.1 Chipset
15%
Combining Directories on a Single Mountpoint
19.05.2014
Home »  HPC  »  Articles  » 
.325 56.328 58.231 67.588 14,100 2,860 SSHFSM OPT3 54.595 61.111 67.107 67.379 13,958 2,670 SSHFS OPT4 78.600
15%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
take both a host-based and network-based approach. The suite uses three tools for host-based intrusion detection: (1) Wazuh [3] is a fork of the OSSEC [4] intrusion detection system; it monitors hosts

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice