Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (935)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 Next »

26%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
technologies (e.g., AppLocker), WDAC plays to its strengths because it is not possible to infiltrate the check process itself. Defender Credential Guard Defender Credential Guard [6] is one of the most
26%
An overview of VMware tools
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Giuseppe Ramos, 123RF.com
level is only possible after the integration of vFabric Hyperic 5.6. Infrastructure Navigator vCenter Operations Manager provides extensive reporting and analysis functions by way of the v
26%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
Podman in their standard repositories. In immutable Linux distributions like Fedora CoreOS [5] and openSUSE MicroOS [6] (Figure 1), Podman comes pre-installed. Both Linux distributions offer a minimal
26%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
outside the scope of backups. The length of a backup period is a business- and process-based decision and not a technology-driven decision. You can also see the deleted file in Table 6. Table 6: inode
26%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
-password If your private repository uses SSH keys for authentication, you can provide the SSH private key in the Secret instead of a username and password (Listing 6). The url field specifies the SSH URL
26%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
relaying party you still have to maintain is the one between ADFS and Azure AD (shown in Figure 6 as a light green connection). Figure 6: Azure Active
26%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
(Figure 6), which lets end users create virtual machines as a Service Servicing Portal. After installing the required packages on Alice, take a look at the /etc/openstack-dashboard/local_settings.py file
26%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
  Total runtime: 175.403 ms 15 (6 rows) 16  17 EXPLAIN ANALYZE SELECT * FROM mail WHERE msg ~ '(updatable|views)'; 18                                                QUERY PLAN 19
26%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
are documented in the .zip file format specification. Also, starting in version 6.2 of the ZIP format, file name encryption was introduced so that metadata was encrypted in what is called the “Central Directory
26%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
 Parallel-NetCDF that uses MPI-IO underneath. The initial goal was to focus on older formats: CDF-1, the “classic” format primarily used for netCDF through version 3.5, and CDF-2, added in CDF-1 version 3.6.0 onward, which

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice