Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (469)
  • Article (155)
  • News (17)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 65 Next »

19%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
Amazon started converting its excess computational power to cash some time ago. Under such names as EC2 (Elastic Computing Cloud), S3 (Simple Storage Service), and SimpleDB, the book and coffee
19%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
. The required modifications are explained in the Huginn wiki [3]. The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3
19%
Web Cryptography API
26.11.2013
Home »  Articles  » 
: In the opinion of the Foundation, the Encrypted Media Extensions contradict W3C’s vision of an open web and excludes certain browsers and platforms from the World Wide Web. EME obstructs interoperability
19%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
1 4,423.19 8,100.00 8,012.09 Proxy server subscription 2 4,500.00 3,850.00 4,006.04 Management/Provisioning subscription 2
19%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
in a custom deskside chassis. A third system, from Cray, used commodity processors with custom motherboards and chassis. It focused on incorporating Cray’s high-performance computing (HPC) expertise
19%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
: "routers", "value": "192.168.2.254" }], "reservations": [{ "hw-address": "00:11:22:33:44:55", "ip-address": "192.168.2.60", hostname: "host-2-60" }, { "hw-address": "00:00:00:00:00
19%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8.64 41.79 Table 1: Benchmark Times
19%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
, in which you create one or more rules of this type for each logfile with relevant information. Listing 2 Log Entry Examples # Feb 22 08:00:00 hostname sshd[1234]: Failed keyboard
19%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
, the problem of writing a dump to an MD RAID or transferring larger kernel images ultimately proved unfixable. Further attempts with Netdump (Red Hat) or Diskdump [3] in 2002 and 2004 also had only moderate
18%
Wireshark
27.11.2011
Home »  Articles  » 
 
to the network interface’s link layer. Administrators can control Tcpdump’s behavior at the command line by passing in parameters, including the filters to use. Ethereal and Wireshark Because a command

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 65 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice