Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1133)
  • Article (286)
  • News (72)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 ... 150 Next »

15%
Remote access with ThinLinc 4.12
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Clem Onojeghuo on Unsplash
with a KDE or Gnome desktop, you need to ensure around 200MB of storage space in each case. Much more important is the availability of RPM support, SSH, and a correct Network Time Protocol (NTP) configuration
15%
Unifying events with Splunk
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sebastian Duda, 123RF.com
assumes that you're familiar with the basic premise of Splunk and have heard of or used OSSEC (a host-based intrusion detection system) [2] and Snare (auditing and event-log manager) [3]. Some choices need ... 0
15%
OpenMP – Coding Habits and GPUs
13.06.2019
Home »  HPC  »  Articles  » 
(i,j) = B(i,j) + C(i,j)    enddo enddo #pragma omp for collapse(2) for ( i = 0; i < N; i++ ) {   for ( j = 0; j < N; j++ ) {     A[i][j] = B[i][j] + C[i][j]    } } The collapse  clause has some restrictions. One
15%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
_syslog => "local0"; You need to add one of the two lines to the Rexfile before the first task. A word of caution: In both cases, only the messages generated by Rex itself end up in the logfiles. The returned uptime
15%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
. For example, the current two streams of Python are the 2.x and the 3.x series. Python 3.0 chose to drop certain features from Python 2.x and add new features. Some toolkits still work with Python 2.x and some
15%
VMware is hit by lawsuit contending GPL violation
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sean Gladwell, Fotolia.com
of Linux kernel developer Christoph Hellwig. One of the 20 most prolific contributors to the Linux kernel, Hellwig has penned 279,653 lines of codes in kernel version 3.19. Hellwig also has expertise
15%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
SHA256 SHA384 SHA384 Table 2 Aliases for SSLCipherSuite Abbreviation Meaning SSLv3 All algorithms supported by SSL 3.0 TLSv1
15%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
for its effect on the optimization potential and classifies it accordingly. If one of the calls would prevent an optimization, the loop is broken and the optimization point receives a category 0 or 3
15%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a 0.88x12.56x9.3-inch device weighing 2.99 pounds
15%
Netcat – The Admin’s Best Friend
20.08.2012
Home »  Articles  » 
 
examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, entering # nc -s 1.2.3.4 examplehost.tld 8181 will connect to examplhost

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice