Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (659)
  • Article (171)
  • News (53)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 89 Next »

9%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
.0.0.0/0 multiport dports 22 Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain f2b-default (1 references
9%
Whitepaper: AMD “Bulldozer” Architecture
10.11.2011
Home »  HPC  »  Vendors  »  AMD  » 
 
6200 Series processors. SVR-16    2Based on testing in AMD Performance Labs as of August, 2011, an AMD Opteron™ processor model 6174 (12-core 2.2GHz) consumes 11.7W in the active idle C1E power state
9%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
(pr->pr_path), 0); 17 [...] 18 error = copyinstr(j.hostname, 19 &pr->pr_host, sizeof(pr->pr_host), 0); 20 [...] 21 pr->pr_ip = j.ip_number; 22 pr->pr_linux = NULL; 23 pr->pr_securelevel = securelevel
9%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
press the Tab key twice, you will get a list of the filesystems mkfs  currently supports. For example, on my Ubuntu 22.04 system, I get the following output. $ mkfs mkfs
9%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
17 %description 18 Custom SELinux policy module. 19 20 %prep 21 if [ ! -d custom-selinux-policy ]; then 22 mkdir custom-selinux-policy 23 fi 24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
9%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
gas prices. The company announced its VMware Ready Desktop Solutions program on June 22. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
9%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
” on a single special motherboard. Each node was a Transmeta Efficeon processor connected to the other nodes over Gigabit Ethernet (GigE). Each node also had 512MB of memory, and the system had a 160GB hard drive
9%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
, 16MB cache, SATA interface. The Buffalo and Netgear models were delivered with pre-installed disks and did not give us the option of using 2.5-inch disks. For our benchmarks, we configured all
9%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
bandwidth measurements as follows: Kilobytes are written as k or kb. Megabytes are written as m or mb. However, I'm more comfortable using kilobits and megabits. These terms are notated
9%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
_hosts) on each SSH client that stores information about fingerprints and an SHA256 hash of the public key of trusted communication partners. SSH now checks this information for a match each time a connection

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 89 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice