Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%2222%25390 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (145)
  • Article (84)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 24 Next »

49%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
command, except it lists all of the cores at once. Listing 4 Real or SMT? Method 2 $ cat $(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq 0
49%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
x41 23 CPU architecture: 7 24 CPU variant : 0x2 25 CPU part : 0xc09 26 CPU revision : 9 27 Hardware : grouper 28 Revision : 0000 29 Serial : 0f410a0001440200
49%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... ). The requirements for EncFS are pretty simple: FUSE version 2.6 or newer. rlog – C++ logging library. OpenSSL versions 0.9.6 through 0.9.8 (other version are untested). boost – a C++ utility library ... The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
48%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
.12.6) DSM 5.0-4493 Update 5 (Linux 3.2.40) Thecus OS 5.0 (Linux 3.10.47) ReadyNAS OS 6.1.9 Price (without disks,EUR incl. VAT) $350/EUR390 $300/EUR250 $370/EUR430
48%
LXC 1.0
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © designpics, 123RF.com
Linux containers have been fully functional since kernel 2.6.29. However, Linux has had containers in the form of Virtuozzo [1] and OpenVZ [2] for some time. The difference is that the Linux kernel
48%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
not to log the SYSTEM_BOOT event type. Using ausearch -m 2>&1 | tr ' ' '\n' | grep '[A-Z]$' | sort will show a list of all available event types. Viewing Log Files The ausearch command can also be used ... 25
48%
Listing 5
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
.1 M Total download size: 3.9 M Installed size: 18 M Is this ok [y/N]: y Downloading Packages: (1/4): php-5.3.3-14.el6_3.x86_64.rpm                                    | 1.1 MB     00:00 (2/4): php-cli-5
48%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
): ssh-keygen -t ed25519 -a 100 -f ubuntu-sre-id_ed25519 -q -N 2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
48%
Manage status messages in CouchDB with MapReduce
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Austin Distel on Unsplash
Design Document with Views { "_id": "_design/queries", "_rev": "6-856a5c52b1a9f33e136b7f044b14a8e6", "language": "javascript", "views": { "by-timestamp": { "map": "function (doc) {\n
48%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
into the groupware. For this purpose, you first create a local Unix socket (lines 2-5) and edit two configuration files (Listing 8). Then, launch the services in question (Listing 7, lines 7-9). Listing 7

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice