Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (430)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 229 Next »

13%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
simple job can use the cpufetch  command. Figure 1 shows example output of the cpufetch  command on my laptop.  Figure 1: Output from cpufetch. Note
13%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
packages, entering python3 instead of python will output the following: $ python3 --version Python 3.5.2 On Debian derivatives (I'm using Mint/Ubuntu on my laptop), you can use the following commands
13%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
to be hacked. UAF allows online providers to configure the user experience they choose. This means any service provider can configure it to use the local biometric alone or biometric plus PIN combination
13%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
email to an employee with malware attached. Alternatively, they could infect the laptop of a sales representative outside the protected network with malware that works its way through a local server when
13%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
offers a whole range of models with different capabilities, with prices ranging from EUR29 to 109 (VAT not included; or about $25--$88). They also produce a line of Qubes OS-certified laptops and Nextcloud
13%
Bluetooth Vulnerability Makes Spying Easy
28.08.2019
Home »  News  » 
 
pairing to secure their connection.” The vulnerability exposes billions of smartphones, laptops, and industrial devices. There is nothing users can do to protect themselves at this time. According
13%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
virtual network (VNet). The Basic option provides the general switch that enables or disables access to resources on the new network from the Internet. Although this is not very granular
13%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
. Because the principle of a secure local network is so tempting at first glance, many companies have quickly applied it to their client landscapes, too. They are actively supported by many service providers
13%
Totally Stressed
30.09.2013
Home »  Articles  » 
 
are not sure what board you have installed, or you use a laptop with a motherboard designed specifically for mobile use, simply press the OK button to enable the first list entry, Run_sensors-detect . Your
13%
Environment Modules Using Lmod
08.08.2018
Home »  HPC  »  Articles  » 
One of the key tools for any cluster is environment modules, which allow you to define your user environment and the set of tools want to build and execute your application. They provide a simple

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice