Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12 00s Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (224)
  • Article (79)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

7%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
-enabled clients, such as the Lightning Thunderbird extension, Evolution, OS  X applications like Apple's iCal (Calendar since Mountain Lion), as well as iOS and Android systems. For this to work, the Kolab team ... data available on iOS and Mac OS  X and in Thunderbird and Evolution.
7%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
examples created a slider in the Pluto notebook (Figure 3) with @bind x Slider(1:10) In HTML, the closest equivalent is: However, the two examples
7%
Creating SmartOS zones using UCARP
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Le Moal Olivier, 123RF.com
storage (DS3), Lucene, MongoDB, Riak, REST, SaaS, and so on. Additionally, you have to forget the old-fashioned IP address bound to a specific service or welded to a specific machine providing a particular
7%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -sL option (nmap -sL) performs
7%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
: CUDA Forward Compatibility mode ENABLED.   Using CUDA 12.6 driver version 560.35.03 with kernel driver version 535.161.08.   See https://docs.nvidia.com/deploy/cuda-compatibility/ for details.   Epoch 1/100 782/782 ━━━━━━━━━━━━━━━━━━━━ 21s 12ms
7%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
             50.000000  smg_relax.c(408) 12         24             50.000000  main.c(516)  openss>>expview -vtrace Fpe Event     Exclusive   Inclusive  % of   Call Stack Function (defining location) Time(d:h:m:s
7%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
crunch away on installing MariaDB. The first step is to download and run the MariaDB repo setup script: wget https://downloads.mariadb.com/MariaDB/mariadb_repo_setup chmod +x mariadb_repo_setup sudo
7%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
out.write('Subject: %s\n' % subject) 067 out.write('Auto-Submitted: %s\n' % 'auto-generated') 068 out.write('X-Auto-Response-Suppress: %s\n' % 'OOF') 069 070 # convert message back
7%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
-resizefs ran successfully 2018-10-09 20:43:00,261 - handlers.py[DEBUG]: finish: init-network/config-set_hostname: SUCCESS: config-set_hostname ran successfully ... There is one thing worth mentioning here
7%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
. Table 1 Pen Testing Steps Activity Description Tool(s) Used Hacker Lifecycle Step Profile the resource and/or user Use active and passive scanning techniques

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice