Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 48 Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (15)
  • Article (1)
  • News (1)
Keywords

« Previous 1 2

28%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
have 26 cores or 52 hyperthreads per NUMA node for the VM. Figure 2 shows a four-socket server with 28 cores per socket and 6TB of RAM. Figure 2: A four
28%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
it is a little bigger, at 31899301. Listing 3: Files in the Compressed Archive laytonjb@laytonjb:~/DATA_STORE$ ls -lstar total 62316 31152 -rw-rw-r--  1 laytonjb laytonjb 31897275 Aug  2 09:52 data1_08022025.tar
28%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
. In this case you will select the Quiet Mode Option. The final touch will be to make sure you get alerts when something fails at 3:00am, so you will be notified (or not). The Beep Control option is especially
28%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
of the Kickstarter campaign in 2020, which raised the impressive sum of $4.8 million according to the Hackaday platform [2], an active community has sprung up around this practical device, helping to drive the project
28%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
28%
Remote desktop based on HTML5
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Phanlop Boonsongsomnukool, 123RF.com
quickly view the password hash at the command line with the md5sum utility: # echo -n | md5sum -t 319f4d26e3c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password
27%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [3]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common

« Previous 1 2

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice