Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 189 Next »

10%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
-On The current v1.5 of Proxmox VE from May 2010 [1] is based on the Debian 5.0 (Lenny) 64-bit version. The Proxmox VE kernel is a standard 64-bit kernel with Debian patches, OpenVZ patches for Debian, and KVM
10%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
-Client, Samba-Winbind [2], and the Kerberos package, which is typically called krb5 , or something similar, by most distributions. Once you have all of these components in place, you can launch
10%
Managing the Build Environment with Environment Modules
06.11.2012
Home »  HPC  »  Articles  » 
using the avail option: $ module avail -------------------------- /opt/Modules/modulefiles ----------------------------- atlas/3.10.0/gnu4/i5-2400S modules blacs/1.1/gnu4/mpich2
10%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
) 8 (4) 7.2 0.9 Nehalem-EP (2009) 8 (4) 32 4 Westmere-EP (2010) 12 (6) 42 3.5 Westmere-EP (2010) 8 (4) 42
10%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
The Lua scripting language was developed in 1993 at the University of Rio de Janeiro and was placed under the MIT license as of version 5
10%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
cores. Sometimes these resources are shared in interesting ways. The example in Figure 1 is the Xeon E5 v2 to Xeon E5 v3 processors (courtesy of Enterprise
10%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
(GNU/Linux 5.4.0-56-aws x86_64) Whether you launch the instance with the Amazon Web Services (AWS) Console [2] or the AWS command-line interface (CLI) [3], you can easily find the moment it becomes
10%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
Metasploit tips for achieving privilege escalation. For instance, wouldn't it be great to have a shell on another computer just in case you lose your meterpreter shell? Integrating Nessus 5 with Metasploit
10%
Moore's Law Continues its Unwavering March
09.10.2013
Home »  HPC  »  Articles  » 
to the nanometer scale and enabled ever-increasing speeds. The original Intel 8086 microprocessor sported 29,000 transistors and clocked at a then-blistering 5MHz; 28 years later, the 2.93GHz Intel Core 2 Duo
10%
SMART Devices
14.08.2020
Home »  HPC  »  Articles  » 
and SMART values. The disks were a combination of consumer-grade drives (SATA and PATA) with speeds from 5,400 to 7,200rpm and capacities ranging from 80 to 400GB. Several drive manufacturers were represented

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice