Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm&123%21600 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (30)
  • Article (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 Next »

47%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
"; ## SECRET-DATA 13 } 14 gateway remote-racoon { 15 ike-policy test123; 16 address 192.168.1.7; 17 no-nat-traversal; 18 external-interface ge-0/0/0.0; 19 } 20 } 21
47%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
backups are created faster. Duplicity is licensed under the GNU GPL and thus can be used free of charge. Duplicity is tailored for Linux and other Unix operating systems, such as BSD or OS X. Most major
47%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
http://opennebula.org/repo/ openSUSE/12.3/stable/x86_64 opennebula zypper refresh zypper install opennebula zypper install opennebula-sunstone For Debian and Ubuntu, a tarball is available with several
47%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
: Asymmetrical routing can be relatively easily avoided with namespaces. In practice, virtual veth<x> network devices are fairly typical for network namespaces. Whereas a physical device can only exist
47%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
": [ 16 { 17 "GroupName": "RND-Admins" 18 } 19 ] 20 }, 21 { 22 "Path": "/", 23 "UserName": "guido", 24 "Arn": "arn:aws:iam::123456789:user/guido", 25
47%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
datacenter: "{{ Vv_datacent }}" 19 folder: "{{ Vv_folder_1 }}" 20 state: absent 21 when: vm_facts.instance is defined 22 23 - name: Deploy VM from Template file 24 vmware_deploy_ovf: 25
47%
Where Does Job Output Go?
11.09.2023
Home »  HPC  »  Articles  » 
performance and cost per gigabyte. Go right along the x-axis for increased capacity. Storage Tiering with Local Node Storage When HPC clusters first became popular, each node used a single disk to hold
47%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
along the x-axis for increased capacity. Storage Tiering with Local Node Storage When HPC clusters first became popular, each node used a single disk to hold the operating system (OS) that was just
47%
Warewulf 4
13.12.2022
Home »  HPC  »  Articles  » 
/6): tftp-server-5.2-24.el8.x86_64.rpm                         123 kB/s |  49 kB     00:00     (4/6): dhcp-server-4.3.6-47.el8.x86_64.rpm                       3.9 MB/s | 529 kB     00:00     (5/6): bind
47%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
After installing WSL for container operation, you should always check for and install any Windows updates to be on the safe side. To use the new WSL2 version, the WSL2 Linux kernel update package for x64

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice