Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12!490 Llorente 1202 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (292)
  • Article (83)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 Next »

17%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
Franklin Some big changes are happening in the processor world right now. For the past 15 years or so, both the HPC world and the enterprise world have settled on, for the most part, x86 as the processor
17%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX,10 Fierce [2], written
17%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
-12 MG Benchmark Completed. Class = C Size = 512x 512x 512 Iterations = 20 Time in seconds = 35
17%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
SANs, although Red Hat marketing documents [4] claim that RHSS 2.1 "can generate up to 52 percent in storage system savings and an additional 20 percent in operational savings." These figures clearly ... If you believe Red Hat's marketing hype, the company has no less than revolutionized data storage with version 2.1 of its Storage Server. The facts tell a rather different story. ... RHSS 2.1 ... Red Hat Storage Server 2.1
17%
Managing Active Directory at the command line
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Flashon Studio, 123RF.com
, but also a full set of PowerShell modules. Again, you need PowerShell v2 installed. The minimum requirement for installing PowerShell is the .NET Framework 2.0. The PowerShell Integrated Scripting ... Professionally manage Active Directory users, groups, and other AD objects with Windows PowerShell Version 2.0.
17%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
see the lines shown in Listing 2 indicating that the reload was a success and completed without errors. Listing 2 /var/log/auth.log Aug 19 18:10:43 localhost sshd[3328]: Received SIGHUP
17%
Tips and Tricks for Containers
12.05.2020
Home »  HPC  »  Articles  » 
. done. Processing triggers for install-info (6.5.0.dfsg.1-2) ... Processing triggers for libgdk-pixbuf2.0-0:amd64 (2.36.11-2) ... Now, I'll make sure Octave is installed: root@c31656cbd380:/# octave
17%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
(Figure 2). Figure 2: The “.htaccess” file is placed inside a directory you can password protect. Inside the .htaccess file is the username
17%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
repair boot sectors or modify partitions. Additionally, Avira Rescue System also scans Linux systems for malware, which it also can remove. The hybrid image, which weighs in at around 1.2GB, can be booted
17%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
- or web-service-based – in which the use of self-signed certificates is not a problem. In-House Label OpenVPN [1] traditionally relies on Easy-RSA [2], of which version 2 is widely used. Many, especially

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice