Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 37 Next »

72%
Harden your Apache web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
normally does not add a footer to the pages with Apache Server at www.example.com Port 443 . In contrast, ServerTokens defaults to Full, and the resulting output is a header. You can query this header ... Cyberattacks don't stop at the time-honored Apache HTTP server, but a smart configuration, timely updates, and carefully considered security strategies can keep it from going under.
71%
Just-in-time administration in Active Directory
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Orlando Rosu, 123RF.com
. Dynamic Groups A kind of JIT with on-board tools that doesn't have to call a time-controlled function became available in Server 2003. The Server 2003 schema and function level introduced dynamic objects
71%
Warewulf 4 – GPUs
20.02.2023
Home »  HPC  »  Articles  » 
and tools on the head node as you would a workstation or desktop. The compute nodes are treated differently because they don't have an attached monitor, which means you need to modify the container used
71%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
even change directions mid-flow. Linux Specifics Teamviewer offers downloads of deb and RPM versions 5.0.8206 packages for Linux, along with an X64 deb package and a simple tarball that you don't even
71%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
). Figure 3: JShell evaluates entries after each newline, much like Python or TCL. JShell evaluates the input after each newline, as in Python or TCL, whether it is normal Java code or one of the JShell
71%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
and faster than a human could, but they cannot design them. © Kittipong Jirasukhanont, 123RF.com ADMIN: That would be a metaphor for powerful AI then? But even weak AI can do many things faster
71%
Using Univention Corporate Server 2.4 for virtual infrastructure management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Martin B, Pixelio.de
in a production environment since version 3.2, KVM currently seems to be stealing the limelight for two reasons. The official Linux kernel doesn't support operations with a dom0 implemented in PVOps (Xen 4
71%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
,4)2,*. If the array is local to the image, you access the array as you normally would. For example, for image 3 to access element (2,2) from the array, the statement would be something like b = a(2,2). You can always
71%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
. After the introduction of multiple new features (e.g., the ability to protect host machines that aren't running containers, serverless function protection, and improvements in continuous integration
71%
Cron alternatives fcron and hcron
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © stillfx, 123RF.com
value ranges can be found in Table 2; the asterisk is used as a wildcard. To enter a command, simply type what you would normally type at the command line. Listing 3 shows some examples. Table 2

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice