Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (946)
  • Article (297)
  • News (167)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 142 Next »

15%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
, or remote maintenance access are increasingly being set up in the scope of Industry 4.0, and an ASM system would, one hopes, find them. According to Strobel, however, these problems are peripheral, saying
15%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
is that there is no equivalent of RAID 0+1 or 51 in ZFS – only device arrangements similar to RAID 10, 50, or 60. By default, ZFS will use any idle RAM in the system as the primary Adaptive Replacement Cache (ARC). A common rule
15%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters] DWORD DomainCompatibilityMode 1 DWORD DNSNameResolutionRequired 0 The preceding code tells the registry to add two DWORD
15%
Rex
19.02.2013
Home »  Articles  » 
_syslog => "local0"; You need to add one of the two lines to the Rexfile before the first task. A word of caution: In both cases, only the messages generated by Rex itself end up in the logfiles. The returned uptime
15%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
']; 04 for (_i = 0, _len = _ref.length; _i < _len; _i++) { 05   auto = _ref[_i]; 06   alert(auto); 07 } Additionally, for [...] in lets you create comprehensions — that is, functions that generate a new
15%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator client runs on Android, iOS, and BlackBerry devices
15%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
PowerShell\v1.0\;C:\Program Files (x86)\Common Files\Citrix\System32\ To use Cygwin effectively, you need to add E:\Cygwin\bin to your PATH environment variable. Of course, use the location of your installation
15%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
. That means you need to define a different separator – the new separator follows the option with the angled brackets: hostlist relay_from_hosts = <; 85.214.7.0/24; 2a01:238:10b::/56 If you are configuring
15%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.0 release, including time delays
15%
Improved Performance with Parallel I/O
24.09.2015
Home »  HPC  »  Articles  » 
would take is to use a high-level library such Parallel HDF5. You can use MPI-IO underneath the library to get improved I/O performance, but it might require some tuning. The benefit of using a high0level

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 142 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice