Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm&123%21600 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (362)
  • Article (118)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 52 Next »

30%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
897781 03 5265 -rw-r--r-- 1 root root 5390660 Nov 10 10:25 PGAS Languages NCSA 2009.pdf 04 65 -rw-r--r-- 1 root root 65893 Nov 10 10:25 cavp-03.pdf 05 0 drwxr-xr-x 1 root root 0
30%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
care of hosts rather than specific applications, the Cloudify developers leverage the power of Chef as a central management tool. Since Cloudify 2.2, it has been possible to use Chef to deploy
30%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
30%
Managing Virtual Infrastructures
21.01.2013
Home »  Articles  » 
 
NIC. However, the CPU must be a 64-bit system with a mandatory virtualization extension: either AMD-V or Intel VT. In contrast to RHEV 2.2, RHEV 3 is no longer based on RHEL 5, but on RHEL 6, which
30%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
, just in case the device is left behind or lost. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86
30%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
't speak until spoken to.)   The port scanner sends out a SYN request on a particular port number (22). The target responds with an ACK. The scanner notes the ACK and sends a RST to disconnect from
30%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
) layer for the cloud, virtualizing the various hardware components and making them available through a standard API. The first OpenStack release (dubbed "Austin") became available October 22 [3]; The Open
30%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
{ 22 System.out.println("Expected arguments: [nfs server] [nfs path]"); 23 return; 24 } 25 26 Server server = new Server(args[0], args[1
30%
What's Ahead for OpenMP?
05.12.2011
Home »  HPC  »  Articles  » 
multiplatform shared-memory multiprocessing programming in C, C++, and Fortran on most processor architectures and operating systems, including Linux, Unix, AIX, Solaris, Mac OS X, and Microsoft Windows platforms
30%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
]# ls -lsa /etc/profile.d/modules.sh 4 -rwxr-xr-x 1 root root 566 Jun 27 17:07 /etc/profile.d/modules.sh [root@test1 ~]# cp /opt/Modules/default/init/bash /etc/profile.d/modules.bash [root@test1 ~]# chmod

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice