Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (315)
  • Article (8)
  • News (8)
Keywords

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 34 Next »

18%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
, Listing 3 shows the complete call to audit2allow with the policy module I manually modified for access to an IRC server. Listing 3 Policy Module # grep xchat /var/log/audit/audit.log | audit2
18%
GNU tools under Windows
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Markus Gann, 123RF.com
to the Windows desktop, but at a little less than 10MB, it is much more compact than Cygwin's 100MB and is also easier to install. Alternatives MobaXterm: A previous article [3] introduced Moba
18%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
Computing in cooperation with Sandia National Laboratories. According to the product announcement, the compact PowerInsight device is small enough to fit a 3.5-inch drive tray, and it can measure power
18%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
't envisage a centralized instance for mutual authentication. Although RFC 4474 [3] defines how to sign SIP messages to allow Alice to authenticate against Bob, there are no widespread implementations
18%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a 0.88x12.56x9.3-inch device weighing 2.99 pounds
18%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
is important. Most existing tools (e.g., Darshan [1], Vampir [2], libiotrace [3]) are profilers that collect data during runtime and provide the collected data for later analysis. With the libiotrace
18%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
solutions is that they can be used to mount a filesystem from a different operating system directly on a new system. For example, one of the more popular FUSE solutions is NTFS-3G, which lets you take an NTFS
18%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
-Anonymity ID Age Gender Zip Code Original Data 1 34 M 12345 2 36 F 12346 3 37 F 12347 4 35
18%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
also frequently provides the underpinnings for a virtualization cluster that runs multiple guests in a high-availability environment, thanks to Open Source tools such as Heartbeat [2] and Pacemaker [3
18%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
/FTP Proxy . If you select HTTP/FTP proxy, you have to fill in the information for your proxy host and port number. Next, you need to select a download site from the list displayed on the screen. In Figure 3

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice