Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 48 Next »

77%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
the previous layer: model.add(layers.Conv2D(32, (3,3), padding='same', activation='relu')) After this second 2D convolution layer, you have another batch normalization layer followed by a new layer type
77%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
. The disadvantage of hardware appliances is that they are less flexible than software, which you can adapt to suit your own landscape. Cuckoo [3] was launched in August 2010, and the release candidate for version 2
76%
News for Admins
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
is the Red Hat Advanced Cluster Management tool, which provides the ability to manage a fleet of OpenShift clusters. For more information about RHEL 8.3, read the official release notes (https://access.redhat.com
76%
Shell in a Browser
15.03.2012
Home »  Articles  » 
 
safe mode must be disabled for this to work – its normal job is boosting security by restricting the execution of certain commands (see the “More Security” box
76%
Data center networking with OpenSwitch
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © higyou, 123RF.com
REMOTE VER KEYID REF-ID ST T LAST POLL REACH DELAY OFFSET JITTER ---------------------------------------------------------------------- 1 ntp.linux-magazine.com - 3
76%
Shell access via a web browser
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Roman Pyshchyk, 123RF.com
normal job is boosting security by restricting the execution of certain commands (see the "More Security" box). More Security Saving encrypted passwords with pwhash.php might prevent unauthorized
76%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
whether the device is sending REGISTER packets (Figure 3). If the packets are reaching their target, you can then analyze the server response. A server that remains silent indicates a network problem
75%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
. Figure 3: Timing the ability of Google.com to serve SSL sessions, without differentiating whether one or multiple servers are answering the requests. The Storage with the Most I have covered a lot
75%
Integrating a Linux system with Active Directory
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Francesco Gallarotti on Unsplash
that will add the Ubuntu machine to Active Directory can be the normal administrative user or a member of the administrative group. However, this element solely depends on your configuration. All DNS queries
75%
Gatling load-testing tool
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by NoWah Bartscher on Unsplash
, by subclassing from the Scala Simulation class. The simulation is essentially a collection of individual requests that a user or program would normally make. Because your test is a program, you are given

« Previous 1 2 3 4 5 6 7 8 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice