Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (943)
  • Article (298)
  • News (167)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 142 Next »

28%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
unicast address. The home agent means that the MN is accessible everywhere via its home address (Figure 2). Figure 2: Mobile IPv6 terminology. The MN
28%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
into a ZIP archive: zip Ubuntu12041.zip /boot/System.map-3.2.0-29-generic module.dwarf This kernel profile should then be moved to the volatility/plugins/overlays/linux/ directory. The analysis feature
28%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
.keys.sort.each do |s| 14 printf "%20s %d\n", s, summary[s] 15 end 16 puts "Polling for changes (Ctrl-C to end)" 17 loop do 18 sleep 2 19 client.instances.each do |inst| 20 if state[inst.id] != inst.state 21
28%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
 time:           5.245 seconds     iter    1   iter    5   iter   10   iter   15   iter   20    Benchmark completed  VERIFICATION SUCCESSFUL  L2 Norm is  0.5706732285739E-06  Error is    0.1345119360807E-12      MG
28%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
.logp gpu-manager-switch.log boot.log kern.log dmesg syslog dpkg.log Xorg.0.log dpkg.log   These logs typically have a more or less
28%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
(s), and DNS server. However, IPv6 offers several other features that are not controllable via the standard configuration dialog. Also, the overview you get when you press Details is very rudimentary (Figure 2
28%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
RR can be removed as soon as its DNS time to live (TTL) has expired. Listing 2 Fingerprint in the TLSA RR $ dig TLSA _25._tcp.mail.sys4.de +short 3 0 1 9273B4E9040C1B9EE7C946EFC0BA8AAF2C
28%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
Initialization time: 5.245 seconds iter 1 iter 5 iter 10 iter 15 iter 20 Benchmark completed VERIFICATION SUCCESSFUL L2 Norm is 0.5706732285739E-06 Error is 0.1345119360807E
28%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
on other Linux systems such as CentOS or Fedora. First, you need to grab the JBoss Data Virtualization software [2]. Then, unpack the JAR archive using java -jar jboss-dv-installer-6.0.0.GA-redhat-4.jar
28%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
open source tools are provided to ensure no license problems or restrictions. TurnKey Linux (TKL) is based on Debian 7.2 and thus provides business applications and security updates for more than 37

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 142 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice