Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (291)
  • Article (97)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 Next »

14%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
14%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
the recommendations in the RustDesk documentation and enabling and configuring the firewall: sudo ufw allow 22/tcp sudo ufw allow 21115:21119/tcp sudo ufw allow 21116/udp sudo ufw allow 8000/tcp sudo ufw enable
14%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
the configuration and only offer a key exchange via elliptic curves. Disabling the vulnerable compression is not an option in older versions of Apache. It was introduced for the 2.2 series in version 2
14%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
. In general, the algorithm assigns data of an arbitrary length to a datum with a fixed length. Well-known examples are checksums with MD5  [6] or SHA-1 [7]. In the case of distributed data storage systems
14%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
://www.github.com/hbons/SparkleShare – Current version (as of October 2014) 7.0.2 (Community) 1.0.25 1.1 5.20141013   2.2 5.2.3 3.1.7 1.4 7.0 Release date August
14%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
, the encryption is very good if used correctly, the code is open source, and it follows the OpenPGP specification [5], which is also an IETF standard [6]. GPG was really designed as a command-line encryption tool
14%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
[22] (Figure 6). To access the Developer Portal, you first need to register with Mydigipass.com. With the access credentials you are given, you can log in to the developer portal. Besides detailed price
14%
When I/O Workloads Don’t Perform
12.05.2021
Home »  HPC  »  Articles  » 
 errors corrected = 0   Total times correction algorithm processed = 0   Total bytes processed = 0   Total uncorrected errors = 0   Non-medium error page  [0x6]   Non-medium error count = 0   Format status page  [0x8
14%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
are available to let administrators manage jails on the host system [6]. Here's a brief look: jail [-i] [-l -u | -U ] : Starts a jail
14%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
install the ATI Stream SDK [6]. After downloading and unpacking the ATI Stream SDK, it is also a good idea to read the guide. Basically, the path variable $LD_LIBRARY_PATH is extended to include the lib

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice