Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 116 117 118 119 120 121 122 123 124 125 126 127 128 129 ... 189 Next »

10%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
to Thunderbird (Figure 5). Figure 5: The IceWarp server provides its own web interface, similar to Outlook Web App. All interfaces are translated into more
10%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
that of Logstalgia: The hosts listed on the left issue their requests in the form of circles to the middle of the screen (Figure 5). Figure 5: Fudgie fires requests
10%
What’s New in Microsoft Windows 8.1
21.01.2014
Home »  Articles  » 
-hand navigation pane (Figure 5). Figure 5: Microsoft has redesigned the Explorer view in Windows 8.1. To compensate, the user folders are located at the top
10%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
when exposed to heavy load (Figure 5). Figure 5: Cloudify has information for statistics fans: The load indicator shows which resources the individual
10%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
not to save these passwords in the clear in the users file, the rlm_pap module offers various algorithms that use a cryptographic hash of the password, such as MD5 and SHA-1. You pass in the algorithm used
10%
Linux for Windows Admins: Samba Shuffle
18.09.2012
Home »  Articles  » 
 
directory is read only. Map the Remote Linux Share On your Windows computer, open Computer , click Map Network Drive and Browse for the Share , as shown in Figure 5
10%
Mobile PC Monitor
20.02.2012
Home »  Articles  » 
 
tab in the primary tab list. Because I want a very detailed look at what’s going on with my critical systems, I select all of the possible notifications on this tab (Figure 5
10%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
, you can select a suitable rule from a list of predefined rules (Figure 5), which makes sense, for example, if you are enabling the branch cache feature
10%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
application, the speedup limit is 5.0. With a little math and a little computation, the asymptotic value of a is as shown in Figure 3. Figure 3: Asymptote
10%
Managing Port Scan Results with Dr. Portscan
30.09.2013
Home »  Articles  » 
 
, for example, contains parsers for XML and grepable Nmap output as of version 5. The overhead for implementing additional input agents depends on the port scanning tool you need to integrate, but it is typically

« Previous 1 ... 116 117 118 119 120 121 122 123 124 125 126 127 128 129 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice