Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1264)
  • Article (303)
  • News (207)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 ... 178 Next »

15%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
sessions with Google Authenticator [17]. The Google Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator
15%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
to reduce the time it takes to process network packets. Tools like ethtool, ethtool -C eth0 rx-usecs 0 adjust these settings. Summary In this article, I explored the critical components of networking
15%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
comparison in Table 1. Table 1 Five Graph Databases Name Neo4j 1.6 Sones Graph DB 2.0 InfoGrid 2.9.5 HyperGraphDB 1.1 VertexDB Homepage http
15%
FreePBX phone system
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Lofik, Fotolia.com
the rest of the world, DECT 6.0, which makes these devices incompatible with systems used in other countries. DECT has long been considered obsolete and implicitly insecure, and its use is no longer
15%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
is that there is no equivalent of RAID 0+1 or 51 in ZFS – only device arrangements similar to RAID 10, 50, or 60. By default, ZFS will use any idle RAM in the system as the primary Adaptive Replacement Cache (ARC). A common rule
15%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters] DWORD DomainCompatibilityMode 1 DWORD DNSNameResolutionRequired 0 The preceding code tells the registry to add two DWORD
15%
Rex
19.02.2013
Home »  Articles  » 
_syslog => "local0"; You need to add one of the two lines to the Rexfile before the first task. A word of caution: In both cases, only the messages generated by Rex itself end up in the logfiles. The returned uptime
15%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
']; 04 for (_i = 0, _len = _ref.length; _i < _len; _i++) { 05   auto = _ref[_i]; 06   alert(auto); 07 } Additionally, for [...] in lets you create comprehensions — that is, functions that generate a new
15%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator client runs on Android, iOS, and BlackBerry devices
15%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
PowerShell\v1.0\;C:\Program Files (x86)\Common Files\Citrix\System32\ To use Cygwin effectively, you need to add E:\Cygwin\bin to your PATH environment variable. Of course, use the location of your installation

« Previous 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 ... 178 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice