Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00s Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (314)
  • Article (114)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 44 Next »

28%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
– Dmitry Shkarin’s PPMdH with small changes. PCJ – A converter for 32-bit x86 executables. PCJ2 – A converter for 32-bit x86 executables. Bzip2 – The standard BWT algorithm. Deflate
28%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
extensions fused multiply-add (FMA) type L1 (instruction and data) information L2 cache size L3 cache size estimated peak performance The cpufetch  command works for several architectures
28%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
Initiative Daemon Loaded: loaded (/usr/local/lib/systemd/system/crio.service; enabled; vendor preset: enabled) Active: inactive (dead) since Sun 2020-09-20 17:01:22 UTC; 14s ago Docs: https
28%
All you ever wanted to know about hard drives but never dared ask
16.05.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
Introduced by IBM in the 1950s, hard drives rapidly became the primary permanent storage technology of the computer industry and have retained this primacy for the past 50 years. Despite
28%
Redfish standard as a replacement for IPMI Chassis Management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © isselee, 123RF.com
system. Super Micro intends to offer Redfish on its X10 generation boards and future models. All Baseboard Management Controllers (BMCs) starting with version 3 are supposed to support the interface. Intel
28%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
40 1 ::/0 IPv6 addresses 30 2 2002::/16 6to4 addresses 20 3 ::/96 IPv4-compatible addresses (obsolete) 10 4 ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your environment
28%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
The new PostgreSQL 9.3 release introduces several speed and usability improvements, as well as SQL standards compliance. ...  ---------------------------------------------------------------------------------------------------- 20  Seq Scan on mail (cost=0.00..5628.25 rows=4 width=961) (actual 21  time=2.401..1519.809 rows=672 loops=1) 22    Filter: (msg ~ '(updatable|views)'::text) 23    Rows Removed by Filter: 40148 24 ... The new PostgreSQL 9.3 release introduces several speed and usability improvements, as well as SQL standards compliance. ... PostgreSQL 9.3
28%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
available offline on mobile devices (iPhone, Android, Windows Mobile/Phone 7, Nokia S60, iPad, and all Honeycomb tablets). The Oxtender for Mac OS X synchronizes contacts and appointments with the Address ... The latest developments in Open-Xchange 6.20
28%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86 version of W2G, you'll have greater portability than
28%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
Shell command: > Get-Process | Select-Object -Property name, ID PowerSploit expects a list of bytes in the form 0xXX,0xXX,0xXX,0xXX. To generate the correct format, the Backtrack tools collection [2] is helpful

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 44 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice