Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1278)
  • Article (303)
  • News (160)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 175 Next »

9%
Low-code development with Microsoft Power Apps
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Peapop, Fotolia.com
Point. Figure 5: The completed Expense Report application. Now click on NewExpenseCreateButton to create a button for the interface (Figure 6). Select the Advanced tab in the Properties window (on
9%
Discovering device names
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© cbpix, 123RF.com
. # grep PROGRAM /lib/udev/rules.d/71-biosdevname.rules PROGRAM="/sbin/biosdevname --smbios 2.6 --policy physical -i %k", NAME="%c", OPTIONS+="string_escape=replace" You can see that the biosdevname assigns
9%
Dispatches from the world of IT
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
 
, which is based on Linux kernel 3.9.6, includes experimental support for booting PCs with UEFI, as well as an experimental driver for recent Atheros WLAN chips. The software selection is based
9%
All you ever wanted to know about hard drives but never dared ask
16.05.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
bus limit, but the performance advances of the latest SSDs require a speedier SATA 6Gbps interface – check your top bus speed before needlessly retrofitting an older system with a top-notch SSD
9%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
-analyze security, it appears with a high score of 9.6 as UNSAFE and a shocked emoji (Figure 3). Figure 3: Starting point: The new service is completely insecure
9%
Microsoft Exchange 2010: The Highlights
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© peapop, Fotolia.com
with Windows Mobile 6.5, they can now synchronize text messages with their Exchange mailbox, along with email messages, contacts, appointments, and tasks. Exchange previously did not offer an option for sending
9%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
. You must have at least version 1.1.6x of npm (try npm --version ). If not, GitHub has an informative page on how to install current packages for various distros. As soon as you have installed this duo
9%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, 28 ports open for incoming connections, and 441 packages installed and not updated for a while. Listing 2: grep, ps and netstat example results user@metasploitable:~$ uname -a Linux metasploitable 2.6
9%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
, copyout, allocates memory on the accelerator when entering the accelerated region but only copies data from the accelerator to the host when exiting the OpenACC data region (Table 6). No data is copied from the host
9%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
as suspicious. Suricata has a stable code base, and it is used throughout the industry. Although hardly as widely adopted as Snort, Suricata has the ability to monitor both IPv4 and IPv6 traffic, as well

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 175 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice