Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12%390 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (360)
  • Article (121)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 49 Next »

18%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
the process was swapped out of main memory X Average amount of shared text in the process (KB) Z System's page size (bytes) – this is a system constant c Number
18%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
-Host "Removing outdated $MigMBox.pst file." -fore yellow 20 } 21 Write-Host "" 22 23 # Create a .pst file for every mailbox found on system. 24 # 25 Write-Host "Exporting mailbox $MigMBox to file $Mig
18%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
, just in case the device is left behind or lost. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86
18%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86 version of W2G, you'll have greater portability than
18%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
18%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
 3.5.0-44-generic (hercules)         03.12.2013      _x86_64_        (2 CPU)    09:46:03      runq-sz  plist-sz   ldavg-1   ldavg-5  ldavg-15   blocked 09:46:13
18%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
(hercules) 03.12.2013 _x86_64_ (2 CPU) 09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked 09:46:13 1 468 0.02 0.06 0.14 0 9
18%
Tools that extend Bash scripting
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Laschon Maximilian, 123RF.com
't need a working X setup on the system, which is common in the admin world. tput (TUI): Tput is part of the ncurses package supplied with most Linux distributions. At first blush, tput [3] sounds really
18%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
.75 Ivy Bridge EP (2013) 24 (12) 101 4.21 Ivy Bridge EP (2013) 20 (10) 101 5.05 Ivy Bridge EP (2013) 16 (8) 101 6.31 Ivy
18%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
/lib/sheepdog root 582 581 0 13:13 ? 12:00:00 AM sheep -p 7000 /var/lib/sheepdog # grep sheep /proc/mounts /dev/sdb1 /var/lib/sheepdog ext4 rw,relatime,data=ordered 0 0 # grep sheep /etc/fstab /dev

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 49 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice