Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (970)
  • Article (282)
  • News (125)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 116 117 118 119 120 121 122 123 124 125 126 127 128 129 ... 138 Next »

22%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
.stdout.readlines() 69 # if not OK The small collection contains two longer and three short scripts (available online [6]): generate_certs_for_active_users.py creates a certificate
22%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
PCM 48, 56, 64 G.723.1 MP-MLQ/ACELP 5.3, 6.3 H.728 LD-CELP 16 G.729 CS-ACELP 8 G.729 annex A CS-ACELP 8
22%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
enabled: yes 48 state: started 49 daemon-reload: yes 50 name: "{{ item }}" 51 with_items: 52 - squid 53 - socat 54 - socat443 Listing 6 handles the internal VM
22%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
also verify that encryption is in use with the cilium-dbg tool inside each Cilium agent pod: exec cilium-6t6ss -- cilium-dbg status | grep Encryption After enabling encryption on my test cluster, I
22%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
, start by enabling Azure Security Center for your subscription. Navigate to the Azure Portal, select Security Center from the left-hand navigation pane and click Getting started (Figure 6). Choosing
22%
Save money with Samba as the domain controller on a legacy Windows NT-style domain
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Bernad, fotolia.com
privileges. This means domain administrators must assign themselves this privilege. Listing 6 shows how a domain administrator would go about this. Listing 6 Assigning Privileges root
22%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
on the Apache Foundation download page [4] in Other files , below the binaries/win32 directories. In CentOS 6.4, the mod_ssl module is not part of the Apache2 package; you have to install the mod_ssl package
22%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
, plus the parity level of the group. Thus, the optimal RAID-Z1 group sizes are 3, 5, and 9 disks, RAID-Z2 are 4, 6, and 10 disks, and RAID-Z3 are 5, 7, 11 disks. When combining multiple RAID-Z groups
22%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
submitted jobs (the peak was around 4:00pm, and the low point was around 6:00-7:00am). Just imagine having that information about your cluster. If you use a charge-back model, you could charge more to submit
22%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
by convention – but not necessarily – is imported using: import numpy as np Multidimensional matrices are created in a similar way, that is, with nested lists: np.array([[1, 2, 3], [4, 5, 6]]) If the content

« Previous 1 ... 116 117 118 119 120 121 122 123 124 125 126 127 128 129 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice