Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1052)
  • Article (295)
  • News (149)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 151 Next »

16%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
.jpg  15 cat.9874.jpg   5 cat.9927.jpg  51 cat.997.jpg   37 dog.9809.jpg  32 dog.9862.jpg  25 dog.9915.jpg 27 cat.9821.jpg  14 cat.9875.jpg  24 cat.9928.jpg  29 cat.9980.jpg  23 dog.9810.jpg  22 dog.9863
16%
Remote access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
recommended as the technical underpinnings. If you prefer to work with Ubuntu, you can go for Ubuntu 22.04. SSL and DNS Required Before the installation can start, you have to meet a few requirements
16%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
Alchemy [5]. Phraseanet [1] has been available for download since 2010 under the GPLv3 via GitHub. We installed version 3.8. Before installing, admins should take a look at the documentation [6] to prepare
16%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
health [6]. Highly reliable operation of a cloud infrastructure is a major challenge that necessitates building up knowledge and expertise and establishing the right tools and processes. Level 4
16%
PC over IP
03.09.2013
Home »  Articles  » 
 
. In the Manage Devices section, all Teradici PCoIP devices on the network are detected and listed automatically (Figure 6). Figure 6: Simple but functional
16%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
then Create New Users ; name the user whatever you would like and click C reate (Figure 6). Figure 6: Creating a new user. Once the user is created, go
16%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
Stack definitely allows users to collect data on VMs and store the data persistently beyond a restart of the virtual machine. This is where Cinder enters the game (Figure 6): Cinder equips virtual machines
16%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6). Figure 6: Registered attacks on various ports
16%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
any back-end software because it is provided by Vasco in the cloud (see also the “OAuth API” box). Figure 6: The online demo token by Vasco lets users
16%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
.tool The output is given in JSON format (Figure 5), so piping it to python -m json.tool makes the output readable (Figure 6). Figure 5: Performance data queried

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice