Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 232 Next »

15%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
of a new application, the system will evict caches as required to provide working memory for the new process – the illusion of free memory is preserved, even though those chips were most likely hard at work
15%
Sys Admins Will Love Red Hat Enterprise Linux 7.4
02.08.2017
Home »  News  » 
 
for OverlayFS, RHEL now has full support for the overlay2 storage driver. It also brings full support for package layering with rpm-ostree , providing a means of adding packages like monitoring agents
15%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
be used for this, and communication with the client is handled by classic PAM and NSS interfaces. Different security providers are then on the back end to handle, for example, communications with an LDAP
15%
News for Admins
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
 
to park," said researchers. You don't need specialized devices to produce these signals. The sound can be created by the speakers of the laptop itself. "Our tests have measured a Dell XPS 15 9550 laptop
15%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
of ATA. The hdparm tool, which is included with almost all Linux distributions, at least lets you control the ATA security features by scripting or manual commands. On many laptops, ATA security
14%
Planned Obsolescence Needs to be Obsolete
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
, tablet, and computer. Who can afford to upgrade once a year when new models hit the market? Eight hundred dollars for a phone, $800 for a tablet, and $2,000 for a new laptop is just too much money to toss
14%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
virtualization for Linux, which is not a bad skill to have. The next step up from using VMs on your laptop or desktop is to use VMs from a cloud provider such as Amazon. Cloud VMs give you a great deal of freedom
14%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
Single sign-on (SSO) offers many advantages, and SSO providers can provide valuable services in terms of user account security. Although each user only needs to remember one password to access ... Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat
14%
openSUSE LEAP 42.1 and ClearOS 7.2
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
 
hybrid distro," which combines source from SUSE Linux Enterprise (SLE) with community contributions in an effort to provide a balance between innovation and maturity. The SLE contributions in Leap now ... The openSUSE community offers the "first Linux hybrid distro," which combines source from SUSE Linux Enterprise (SLE) with community contributions in an effort to provide a balance between innovation
14%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
'll provide some sizing guidance. A larger swap area is generally recommended for desktops than servers, sized at up to twice the available RAM. Desktops are likely to have idling applications that can leverage

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice