Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (55)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 Next »

8%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
. The XML document accessed via the entry point's URL contains detailed information about all the resources available through the Deltacloud server, including images, realms, hardware profiles, and so on
8%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
to RVM and to load a bootstrapper. If you have a user-specific installation, you need to add the following line at the end of your ~/.bash_profile or ~/.zshrc for Bash and Zsh, respectively: [[ -s "$HOME
8%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
service checks in more detail as properties that you define individually for each host. One good thing about Opsview is its notification profiles, which even make sense for smaller KVM installations
8%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
sources, such as search engines, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2
8%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
of Oxtender 2.0 for Outlook is supported by a Windows-style wizard, in which the administrator enters the desired profile name followed by the URL of the Open-Xchange server (HTTPS), the interface to use (USM
8%
Touring SUSE's new cloud product
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
in the web interface, which means an involuntary visit to the command line. Users can choose from the set of existing images to launch a new instance. This is where flavors – prebuilt hardware profiles
8%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
logging in over SSH, you will need to enter the command in your personal .profile file to ensure that Goss only provides feedback during interactive logins and not during SCP-based data transfer or before
8%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
is important. Most existing tools (e.g., Darshan [1], Vampir [2], libiotrace [3]) are profilers that collect data during runtime and provide the collected data for later analysis. With the libiotrace
8%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
server. This is handled by a call to pulp-client consumer create --id client1 As with package installation, you can automate this step – for example, as part of a Kickstart profile. The pulp
8%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
checking the client's compliance with defined health policies. A health policy can test whether a firewall is enabled for specific profiles, an antivirus scanner exists, the pattern updates are up to date

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice