Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (315)
  • Article (110)
  • News (15)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 45 Next »

25%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
with an Ethertype of 0x88e5 on the provider's network. Because MACsec works on Layer 2, it must be individually enabled for each interface. Encryption Method MACsec uses AES-GCM as the encryption algorithm
25%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, “Hypertext Transfer Protocol,” which was finally standardized as HTTP 1.0 in May 1996. Just three years later, HTTP 1.1 was standardized to reflect the increasing load on the web. The revised protocol reduced
25%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
has announced the OCI v1.0.0 run time and image specifications. OCI is a cross-industry initiative to standardize technologies around Linux containers. Essentially, OCI seems to achieve the same goals
25%
Analysis tour with Binary Ninja
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Igor Kovalchuk, 123RF.com
the following code admin.c: #include int main(int argc, char **argv) { printf("Hello World!"); return 0; } You can compile the source code with: gcc -O0 admin.c -o admin The -O0 entry switches off
25%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
allow -R -M xguest_irc policy_module(xguest_irc,1.0.0) require { type xguest_t; } ## ##

a ## Allow xguest users to use IRC ##

##
gen_tunable(xguest_use_irc, true) tunable
25%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
desktop license provides access to process mining on desktops and 50MB of process mining data storage, which can be expanded to up to 100GB per tenant. Power Automate Premium also provides AI tools
24%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
, a is the application speedup, n is the number of processors, and p is the “parallel fraction” of the application (i.e., the fraction of the application that is parallelizable), ranging from 0 to 1. Equations are nice
24%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
: In Equation 1, a is the application speedup, n is the number of processors, and p is the "parallel fraction" of the application (i.e., the fraction of the application that is parallelizable), ranging from 0
24%
Adding high availability to a Linux VoIP PBX
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © MIR, Fotolia.com
=physical physicaldevice=eth1 address=192.168.2.100 Enabling logging of all HAast messages Telling HAast about the management IP address of this node and the management IP address of the other node (so
24%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
long count=0; //Count holds all the number of how many good coordinates 14 double z; //Used to check if x^2+y^2<=1 15 double pi

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 45 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice