Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (255)
  • Article (84)
  • News (12)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 Next »

17%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ... In 1995, the Internet Engineering Task Force (IETF) chose IPv6 as the successor to IPv4. Initially, this was not an issue that raised much interest. But this changed when Microsoft added IPv6 ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ... Neglected IPv6 Features ... Securing IPv6
17%
Automation with PXE Boot
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Sergey Jarochkin, 123RF.com
OS 6.5. The first step is to install a base server with a static IP as you normally would. Installing the basic Desktop package is also required, because some steps will require it later for producing
17%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
(xrandr) "provides automatic discovery of modes (resolutions, refresh rates, …) [and] the ability to configure output dynamically (resize, rotate, move, …)" [3]. The xrandr configuration tool lets me
17%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
A quick edit of your pristine MariaDB server's configuration file /etc/my.cnf.d/server.cnf (1) binds the MariaDB service to the localhost and (2) connects and (3) creates the database: Bind-address = 127
17%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
and Brotli Comparison 01 -rw-r--r-- 1 sw sw 124 8 Sep 16:52 hello-world.html 02 -rw-r--r-- 1 sw sw 77 8 Sep 16:53 hello-world.html.br 03 -rw-r--r-- 1 sw sw 113 8 Sep 16:53 hello
17%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
on the Rex host and then copy the public key over to the client (Listing 3). After that, a test login on the client without password should work. Listing 3 Key-Based Authentication 01 root
17%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L3 caches across all cores or shared L2 and L1 caches
17%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
-persistent-net-generator.rules openSUSE, Red Hat 6 * /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
17%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
PI resulting in a brief burst of computation on cores 0, 1, and 6 (Figure 4) and an approximation of pi (purely out of randomness and geometry) to 3.139, computed in just half a second (Figure 5). Executing
17%
Tech News
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
 
and theft in non-production environments, while 53 percent reported data corruption and alteration, and 52 percent cited audit issues and failures. Read more at Delphix (https://www

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice