Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (176)
  • Article (1)
Keywords

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 Next »

17%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that's 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
17%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
on the programming model and compiler in use, these optimizations are so well understood as to carry their own names. Loopy David Spuler's recent works [1][2] feature the taxonomy of loop manipulation strategies
17%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX,10 Fierce [2], written
17%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
-conf --add-device USB-device-name (Figure 6). The command pamusb-conf --add-user user Figure 6: The USB device is identified by its properties. If the user
17%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
an organization by clicking Users | Add Organization (Figure 6). Choose a relevant organization name, enter the details, and click Add . Figure 6: Adding
17%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
Role Information for super-users 11 +------------------------------------------+ 12 Name super-users 13 Users admin 14 Permissions: 15 / CREATE, READ
17%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
the Performance tab on the secondary tab list. I accepted the default settings for the notifications that I wanted for this particular system (Figure 6). Figure 5
17%
Generating information with the touch of a button
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
) package, which includes various tools and packages intended to implement "full Enterprise Resource Planning" (ERP). GNUe Reports depends on the GNUe Common package, and version 0.6.9 was available through
17%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local:///opt/spark/examples/jars/spark-examples_2.12-3.5.2.jar s3a://data/war-and-peace.txt watch kubectl get po
17%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice