Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (201)
  • Article (9)
  • News (1)
Keywords

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next »

59%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
. This table indicates that this does not need to be the case. Even getting close to the speeds of traditional compiled languages would be a welcome breakthrough in high-level HPC tools. In addition to speed
58%
What to Know Before Moving into HPC
08.04.2025
Home »  Articles  » 
configured, try ssh -ing to your experimental system from your experimental system. It should ask for your password. If it does, and you can log in to your system, you are golden. Next, try ssh -ing
58%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
might be duplicating what /var/log/auth.log  does, but you can add whatever extra information you want in the wrapper script and add messages the system log. Environment Modules In the HPC world
58%
Advanced security in Windows Firewall
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Andrius Repsys, 123RF.com
notification when a new program is blocked. Make sure that you press the Back button to go back to the main view, because the feature does not open a separate window. If you click the corner Close icon here
58%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
does not apply the settings. For that, you need to assign the new policy to an organizational unit or domain. The imported settings are effectively a normal Group Policy. After exporting the baseline
58%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
for me on my Ubuntu 11.10 Linux system, and I have reported this as a bug. The terminal window does work on Windows Server 2003, Windows 7, and Windows Server 2008. You can also install available Windows
58%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
with more or less any server available in the wild. However, STONITH via IPMI (or some other method that relies on the network connection being up) does not provide any protection in scenarios in which all
58%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
occur while physically opening the connection to the network. Administrators also need to be aware that NAP does not offer comprehensive protection against attacks. Because the clients transmit
58%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
: The tasklist command does not reveal any evidence of the intrusion. Figure 9: netstat -an still reveals evidence of a foreign connection. A third way
58%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
mismatch!"; 25 } 26 27 ?> Something in the Air Phpass does take some of the load off the web developer's shoulders, but it is by no means a panacea. If a user chooses his date of birth as a password

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice