Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (223)
  • Article (29)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 26 Next »

13%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
# replace: olcRootDN 07 dn: olcDatabase={2}bdb,cn=config 08 changetype: modify 09 replace: olcRootPW 10 olcRootPW: {SSHA}f0pv70XFFox5UqKc6A4Uy39NcxkqcJbc 11 - 12 replace: olcAccess 13 olcAccess: {0}to attrs
13%
Reading and understanding database execution plans
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Gunnar Pippel, 123RF.com
s 04 4> JOIN employees e ON (s.employee_id = e.employee_id) 05 5> WHERE s.sale_date > trunc(sysdate) - INTERVAL '6' MONTH 06 6> AND s.eur_value >= 10; 07 Explained. 08 09 SQL> select * from table
13%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
, 06 "mileage": 15000, 07 "features": ["Sunroof", "Leather seats"] 08 } 09 { 10 "type": "Motorcycle, 11 "brand: "Harley-Davidson, 12 "model": "Iron 883", 13 "year": 2019, 14 "engine
13%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
CentOS 5 to 6 would work – a procedure the release notes advise against – a virtual environment seemed like the prudent decision. The first step is to create a copy of the current system, which should
13%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
: 1386145 0 IO-APIC-edge pata_sch 07 15: 0 0 IO-APIC-edge pata_sch 08 16: 9 0 IO-APIC-fasteoi pciehp 09 17: 3398067 0 IO
13%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31.47 1,336.37 2
13%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
-enabled as the first statement of the setup parameter with gc.enable(). Heisenberg's Law Heisenberg's law of profiling [6] holds that measuring a computing system alters it. How am I altering the system
13%
Matlab-like tools for high-performance computing
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
x86_64 6:3.4.3-1.el6 epel 9.1 M Installing for dependencies: GraphicsMagick x86_64 1.3.17-1.el6 epel 2.2 M GraphicsMagick-c++ x
13%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
ssh ubuntu@52.90.56.122; do sleep 1; done ssh: connect to host 52.90.56.122 port 22: Connection refused ssh: connect to host 52.90.56.122 port 22: Connection refused [ output truncated ] Welcome
13%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
, the attacker cannot use the preference mechanism to stipulate weaker encryption. 6. Choice ofCipher Suite I recommend strong ciphers that implement 128-bit encryption. This list includes AES and Camellia

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice