Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (975)
  • Article (311)
  • News (194)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 149 Next »

15%
News for Admins
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
 
to an email address that is different from the address originally requested. The fix for this bug is included in the Bugzilla 4.2.15, 4.4.10, and 5.0.1 releases. All Bugzilla users are encouraged to upgrade
15%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
, it’s very easy to get laptops with at least two, if not four, cores. Desktops can easily have eight cores with lots of memory. You can also get x86 servers with 64 cores that access all of the memory
15%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
services have official emulators, exposed through the Google Cloud command-line interface (gcloud CLI) by Cloud SDK. These emulators could be run natively on your laptop if the required dependencies
15%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
on our laptops remains at least as secure in every way as, say, on a Chrome OS system. It's downright embarrassing that this is not yet the case. We need to do better, especially in this age of Pegasus
15%
Bluetooth Vulnerability Makes Spying Easy
28.08.2019
Home »  News  » 
 
pairing to secure their connection.” The vulnerability exposes billions of smartphones, laptops, and industrial devices. There is nothing users can do to protect themselves at this time. According
15%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
, energy, and  – on laptops – battery power, even though this is unnecessary in idle mode. The new kernel fixes this vulnerability by not listening for events at fixed times but only when they occur
15%
Using a Tablet as a Portable Management Console
14.11.2011
Home »  Articles  » 
 
. In the Toolbox System administrators require a complete set of tools on any device used for support. Up to now, the support burden rested on the laptop computer. The tablet, as a support device, must have
15%
More Best Practices for HPC Containers
19.02.2020
Home »  HPC  »  Articles  » 
developing tools, applications, and libraries to share with each other and to run on their laptops. Assuming they were root, access was a given. If you are root, you can do anything. Docker is still important
15%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
-line operations. To install Dockly [3], you can choose one of two routes: with npm (see the "Installation by npm" box for that route) and in a Docker container. For context, on my laptop, about 43MB of file space
15%
Hack Uses Headphone Speakers To Record Sound
23.11.2016
Home »  News  » 
 
FBI Director James Comey and Facebook founder Mark Zuckerberg cover the webcams of their laptops with tape because they can be hacked easily. Zuckerberg, like many people concerned with privacy

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice