Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 146 Next »

25%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
be incompatible because of excessive length. Specifically, a partially new constraint is that foreign key names cannot exceed 64 characters; in general, the limit was already 64 characters; however, in some cases
25%
Migrate your Git repositories to Gitea
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Ray Hennessy on Unsplash
with the Git software, which I want to change; the reverse proxy – NGINX in my case, the Exim4 mail server, and various shell scripts, cron tables, and so on. With no exceptions, I store global cron tables
25%
Shell in a Browser
15.03.2012
Home »  Articles  » 
 
, in many cases, the firewall is so restrictive that nothing, apart from HTTP(S), gets through. In this case, PHP Shell and Shell In A Box can help you gain shell access to your server. PHP Shell PHP Shell
25%
Power Talk
01.10.2011
Home »  Articles  » 
 
stages of testing and rollout, then leave it alone, or is this the kind of thing that will get continually tweaked and adjusted with changing conditions? A: In most cases, this is set at the beginning
25%
Interview: AMD’s John Fruehe, Director of Server Product Marketing
04.11.2011
Home »  HPC  »  Articles  » 
tweaked and adjusted with changing conditions? JF: In most cases, this is set at the beginning and not tweaked. Let’s say that you have 8,000 watts of power budget available for the rack and your servers
25%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
libvirt , you can immediately start using virsh – at least normally you can. Many distributions, two of them being Debian and Ubuntu, have offloaded the libvirt tools into a separate package. In this case
25%
Sharing a Linux Terminal Over the Web
08.08.2022
Home »  HPC  »  Articles  » 
the tools I was attempting to find. However, in the case that more information is useful, I'll cover those tools in this article as well. tty-share The only terminal-sharing tool I could find that used
25%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
limit that contributes to serial time. One of the common sources of serial time is I/O. Applications have to read and write data independent of the number of processes. Most commonly in the case
25%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
Hat Enterprise Linux, says, "Innovation and enterprise-grade stability aren't mutually exclusive; Red Hat Enterprise Linux has shown this to be the case for decades, and continues this trend with Red
25%
Security boundaries in Windows
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Jan Canty on Unsplash
and Processes Computers also have security zones. Programs and services that do not run under an administrator account cannot access data or code in the operating system kernel area. Even in this case, of course

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice