Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 00 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (424)
  • Article (111)
  • News (10)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 55 Next »

19%
Rocky Linux RC 1 Now Available
04.05.2021
Home »  News  » 
 
:1 binary replacement for Red Hat Enterprise Linux and currently ships with GNOME 3.32, kernel 4.18.0-240.22.1.el8, SQLite 3.26, virt-what 1.18, samba 4.12.3, dnf 4.2, rpm 4.14, glibc 2.28, libgcc 8.3
19%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command: ./configure CC=gcc --prefix=[binary location] Because I'm running these tests on an Ubuntu 20.04 system, I had
19%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
(verbs), such as GET, HEAD, and, depending on the server, the optional POST, PUT, DELETE, OPTIONS, TRACE, and CONNECT [3]. The key to the success of the web was the hypermedia format, which combines
19%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-interface st0.0; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24; 20 remote 192.168.2.0/24; 21 service any; 22 } 23
19%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
expects as the PSK from the password of test123. I set the encryption algorithm for the first negotiation phase to 3DES and the hash algorithm for authentication was SHA1. The setting for PFS was set
19%
Configuring X Window input and output devices
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ilya lix on Unsplash
1: +DP-2-2 1080/510x1920/287+0+0 DP-2-2 2: +DP-2-3 1920/598x1080/336+1080+0 DP-2-3 You can use xrandr -q to see which modes the individual devices support. You can then set the desired mode
19%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
, in which you create one or more rules of this type for each logfile with relevant information. Listing 2 Log Entry Examples # Feb 22 08:00:00 hostname sshd[1234]: Failed keyboard
19%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
: Z1F35P0G LU WWN Device Id: 5 000c50 050b954c3 Firmware Version: CC27 User Capacity: 3,000,592,982,016 bytes [3.00 TB] Sector Sizes: 512 bytes logical, 4096 bytes physical Device is: In smartctl
19%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
cluster nodes, and the ext3 driver on node A wouldn't have the option of querying the state of the same DRBD resources on node B if it wanted to write to the medium. In the worst case, a write to the DRBD
19%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
. Current enterprise solutions for the virtualization of servers and desktops [3] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 55 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice