Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 09 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (459)
  • Article (74)
  • News (4)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 54 Next »

17%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
. The most popular distributions that follow the lean approach are CirrOS [1], Alpine [2], JeOS (just enough operating system) [3], and the operating system formerly known as CoreOS [4], now called Container
17%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
allowing strong encryption under state control – with a third key, which would be deposited with the secret service. After that, Netscape published SSLv3 to fix at least the worst of the security problems
17%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
of all evil" sums up this point of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
17%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
="filtered" reason="no-response" reason_ttl="0"/>
17%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
17%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
/share/zoneinfo -type f | \ 07 grep -v 'posix|right|Etc|SystemV | \ 08 grep -i $city` 09 echo -n "Time in $1: "; TZ=`echo $z` date The first section of this code ensures that the script's argument
17%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
processor managed only 0.9GFLOPS per watt with a total capacity of 85GFLOPS. Unfortunately, the Polaris was extremely difficult to program and was never available as a commercial product – only five people
17%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
EUR 750 per server will take you a long way. If you intend to virtualize both Windows and Linux systems, the current version of XenServer is a good choice. Check out links [3] through [5
17%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
(Figure 2). Once the installation is complete, type bash to display the prompt (Figure 1, bottom). Like all applications under Windows, the bash shell shown in Figure 3 is launched from the Start menu
17%
Open source customer relationship management software
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Martina Berg, Fotolia.com
With the supporting dependencies installed, you are now ready to download the latest stable SuiteCRM package [3]. At the time of writing, the latest release was version 7.10.11, which is the version I work

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice