Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3%A9n Llorente 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (183)
  • Article (76)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26

14%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
at least two other recent tools that, according to their brief descriptions, would be suitable for the task I set: DocFetcher [2] and Recoll [3] specialize in full-text search and were built for use
14%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node. Getting applications running POD HPC clouds can be quite
14%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
]. The new SPDY protocol is implemented in Nginx version 1.3.15 and will probably be integrated into the stable version 1.4, which is expected in May. (A SPDY patch is available for older versions of the 1.3
14%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
and supplies (e.g., eBay/PayPal's GO 3 token, known as a "security key"). At the heart of two-factor authentication is the Identikey server, which – in the basic version – comprises a RADIUS interface
14%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.9 20 # user setup 21 user --name=example-user --password= --iscrypted --gecos="example-user" 22 # Disk partitioning
14%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
. The problem is well known [3] and should be fixed in the next release. Because the index resides in volatile memory, stopping and then restarting is not a good idea. As an interim solution, you can send kill
14%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
the binary media data as text. Among the myriad ways to do this, the standard in browsers is Base64 encoding [22], provided in Julia by the IBase64 package. Listing 4 shows the server program from Listing 3
14%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
). In such an environment, a "dedicated" MariaDB container could be run as a replacement for a MariaDB VM: podman run --name maria --volume /var/pods/maria:/var/lib/mysql:Z --net pub_net --ip 192.168.1.10 --mac-address 12:34:56:78:9
14%
Flatpak, Snap, and AppImage
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Quino Al on Unsplash
of the technology. However, there is a solution one size smaller. Youngsters The introduction of the DEB [2] and RPM [3] package formats coincided with the birth of the major distributions Debian and Red Hat

« Previous 1 ... 19 20 21 22 23 24 25 26

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice