Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (961)
  • Article (319)
  • News (104)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 139 Next »

20%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
convincing to reveal its inner structure. Listing 3 (No ) Error Message <s:exception>Sabre\DAV\Exception\NotImplemented:exception> <s:message>GET is only implemented on File ... Open standards and open source are requisite in Kolab groupware. The alpha release of version 3.1 hugely extended the number of compatible clients with the CalDAV and CardDAV protocols, making Kolab
20%
Time flies, but it can still be measured
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
.019s The process listing took about 3/100 of a second to execute in the real world and was allocated 5/1,000 of a second of CPU time in kernel mode (i.e., executing system calls) and about 2
20%
Storage innovations in Windows Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liubomirt, 123RF.com
(FC SAN)/Internet Small Computer System Interface (iSCSI). This storage is then provided to the application servers, such as Hyper-V or SQL Server, over the network. SMB version 3 is used ... QoS, Windows Server looks like a good candidate for employee of the month.
20%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
scanner’s -sL option (nmap -sL ) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed. In addition to these standard DNS tools, a pair ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
20%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:net_conf_t:s0 nametype=NORMAL type=CWD msg=audit(1404225360.791:124138): cwd="/home/tscherf" type=SYSCALL msg=audit(1404225360.791:124138): arch=c000003
20%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
-log-bp namespace: kanister actions: backup: phases: - func: KubeExec name: backupToS3 args: namespace: "{{ .Deployment.Namespace }}" pod: "{{ index .Deployment.Pods 0
20%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
+ blog posts. Horowitz explains that Google+ is different. “It’s not just the engagement,” he says. “It’s the rate of engagement and the intensity of engagement.”  But, Horowitz also says developers ... Google+ isn’t officially ready for corporate use, but users are already excited about what this new social networking platform means for the workplace. We look at how you can leverage Google’s
20%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
B   Total PE              476931   Alloc PE / Size       0 / 0      Free  PE / Size       476931 / <1.82 TiB   VG UUID               o1Td3h-y72R-SR2R-HjHh-3mMG-ekXw-pkALKV Listing 3: Volume Group Information
20%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
application then grabs the data from this database and creates charts. The client can be programmed by the user or it can come as a prepared daemon (e.g., collectd [3]). If you like to measure your own
20%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
platform, insert the Examiner USB stick and make sure it shows up as loaded (Figure  2). Next, start the executable on the F-RESPONSE Examiner USB stick (Figure 3), $ ./f-response-tacex-lin.exe -s 192

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 139 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice