Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 37 Next »

69%
Managing Linux systems with Spacewalk
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© patrimonio designs, Fotolia.com
. Resources include software packages or configuration files that are normally organized in channels. A system always has exactly one base channel with optional subchannels. The base channel contains the RPM
69%
Programming with OpenMP
07.11.2011
Home »  HPC  »  Articles  » 
/sunstudio/ [3] Intel compiler: http://software.intel.com/en-us/articles/intel-compilers/ [4] Calculating pi (Wikipedia): http://en.wikipedia.org/wiki/Computing_Pi [5] Amdahl’s law (Wikipedia): http
69%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
2 code with tools such as 2to3 and porting, if necessary, is a good place to start. No More Windows Without PowerShell You don't have to be a Windows fan to know that Microsoft sees Power
69%
Booting Windows from a compressed image
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © ximagination, 123RF.com
directly on the Windows partition, WIMBoot uses pointers that reference files on the WIMBoot image. For this reason, WIMBoot only makes sense for solid state drives. According to Microsoft, "WIMBoot isn't
69%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
additional work, especially if you have a large number of tags; after a while, the results can be unreliable. Also don't forget that button cells are a substantial cost factor and have an environmental impact
69%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
-of-all-trades is licensed under the GNU GPLv3, you can use it free of charge. The only precondition is a fairly recent Linux distribution with Gnome. Although PAC runs on other desktops, you would have to do without some
69%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
relies on YAML and takes an approach that forces playbooks to document themselves. Even though Ansible is simpler than Puppet or Chef, writing your own roles takes time. Wouldn't it be great if you
69%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
the "Container Advantages" box). A container-first principle now applies to all enterprise distributions, with the exception of Debian. Systemd has a few aces up its sleeve that most admins don't even know about
69%
Secure authentication with FIDO2
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lassedesignen, 123RF.com
Authentication (WebAuthn) and the Client to Authenticator Protocol (CTAP) components [3], all the major browsers have gradually introduced support for the Web Authentication JavaScript API and the use of security
69%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
, admins need to build virtual safety perimeters around their virtual machines. It helps that the virtual machines appear to be normal processes from the host system's point of view. These processes in turn

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice