Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (366)
  • Article (98)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 48 Next »

25%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
also is compatible with IPv4 and IPv6 because it resides one layer below in the OSI reference model. Because MACsec is implemented at a low level close to the hardware, it demonstrates high performance
25%
Open source monitoring with Zabbix
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Vincentiu Solomon on Unsplash
. Figure 3: Graphs are used for retrospective problem analysis. The services in Zabbix 6.0 are completely new, with powerful features designed for monitoring and alerting with more than 100
25%
Storage monitoring with Grafana
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Gino Santa Maria, 123RF.com
to collect. The snmpwalk command-line tool queries and displays parts of the SNMP MIB of a target system. The Synology NAS is running on IP address 192.168.2.6 and responds to SNMP queries over protocol
25%
Introduction to OpenMP programming
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Frank Rohde, 123RF.com
(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff 145 146 ! Update solution 147 DO j=2,m-1 148 DO i=2,m-1 149 u(i,j) = unew(i,j) 150 ENDDO 151 ENDDO 152 ENDDO 153 154 CALL
25%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
the first real-time Quantum Application Environment called Leap [6]. "We built Leap based on our experience helping customers build the 100 early real-world applications running on our computers today. So, we
25%
Nagios Passive Checks
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Lisa Young, 123RF.com
04 address 192.168.0.100 05 check_command check-host-alive 06 contact_groups contacts 07 use check_5min_24x7
25%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
.g., 100 for VLAN 100). Type a 1 as the tunnel assignment ID to define a tunnel session ID. You need to configure the same settings for restricted network access; that is, you specify the VLAN
25%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
.g., 192.168.0.0/24). # tcpdump net 192.168.1.1/24 Src, dst Only capture packets from a source or destination. # tcpdump src 192.168.100.234# tcpdump dst 10.10.24.56 host
25%
Hadoop for Small-to-Medium-Sized Businesses
06.05.2014
Home »  HPC  »  Articles  » 
US$ 1.50 for one hour with 100 instances for Hadoop (100 x US$ 0.015) and up to US$ 6.00 for up to 100 instances that run on-demand (100 x US$ 0.06). The bottom line is that you are billed for US$ 7
25%
AWS Elastic Beanstalk
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Aleksandra Glustsenko, 123RF.com
running Node.js 6) 64bit Amazon Linux running Node.js ... Don't create an RDS instance this time, so type n for that option; however, notice how easy launching a whole DB-backed application would

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice