Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (321)
  • Article (122)
  • News (10)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 46 Next »

66%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
For nearly 20 years, web servers have relied on Gzip compression to compress HTML, CSS, and miscellaneous text files, which the browser then receives and unpacks again, speeding up data transfer
66%
An army of Xeon cores to do your bidding
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Lucy Baldwin, 123RF.com
Dell Precision Workstation T7910 Power 1,300W CPU 2x Intel Xeon Gold E5-2699 V4, 22 cores, 2.4GHz, 55MB of cache, LGA 2011-3 GPU, NPU n/a* Memory
66%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
fd9255658c128086395d3fa0aedd5a41ab6b034fd649d1a9260 testuser@laytonjb-MINI-S:~$ podman run -it alpine /bin/sh / # cat /etc/os-release  NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.2 PRETTY
66%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
command: $ cat /var/lib/mysql/testDB/testTB.ibd | head -n 20 The command output will generate plaintext information containing raw data stored in the corresponding database table. Key Management
66%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
(data$IPAddress) 14 srt <- ct[order(ct$freq, decreasing = TRUE), ] 15 top10 <- head(srt,10) 16 17 ggplot(data=top10, aes(x=x, y=freq, fill=x)) + geom_histogram(stat="identity", colour="black", show
66%
Warewulf 4
13.12.2022
Home »  HPC  »  Articles  » 
is my home network (192.168.x.x). The second NIC is connected to a private Ethernet network (10.0.0.1, subnet mask 255.255.252.0), which follows the network addressing discussed in the
66%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
a 20-character password can fail if it falls into the hands of attackers. Therefore you need multifactor authentication (MFA), one-time passwords (OTPs), and similar procedures. Many companies have
66%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
_record; 14 int counter_limit; 15 16 counter_limit = 100; 17 18 for ( counter=1; counter <= counter_limit; counter++) 19 { 20 my_record.x = counter; 21 my_record.y = counter + 1
66%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
-{{ openstack_release }} cirros_deploy_image_upstream_url: https://share/ironic-ubuntu-osism-20.04.qcow2 dhcp_pool_start: 192.168.21.200 dhcp_pool_end: 192.168.21.250 dnsmasq_router: 192.168.21.254 domain: osism
66%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
, just in case the device is left behind or lost. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice