Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 75 Next »

16%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
contain several CPU cores; each core can process two threads simultaneously by hyperthreading, leading to the first performance pitfall: Hyperthreading gives you two logical CPUs (the hyperthreads), which
16%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
in Figure 1. The username required to login to both computers follows -u and the password -p. Figure 1: On the first computer, the login fails, which leads
16%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
2 10:15:51 mail dovecot: deliver (sieve): sieve: msgid=<4E37B272.2060705@ meinefirma.tld>: stored mail into mailbox ' Junk' In the Sieve language, you start by stating the condition, which then leads
16%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
The rapid increase in new cloud services and their popularity will, in future, lead to systems, applications, or accounts being compromised in the cloud. Attackers are always at the leading edge of technology
16%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
or Nabble, besides regular mail delivery, also takes some getting used to. The program doesn't take into consideration the fact that most users will only choose one type, which leads to unintelligible
16%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
because some systems replace these with line breaks during parsing, thus leading to incorrect group assignments. Whenever the system reboots or the Winbind daemon is restarted, the privileges in the /var
16%
Modern network diagnostics
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Paul Aniszewski, 123RF.com
, which might not be desirable in bandwidth-constrained environments. Additionally, some network devices might be configured to deprioritize or drop ICMP traffic, which can lead to inaccurate results
16%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
leading to what are inscrutable instructions in the eyes of the original domain experts. Furthermore, these strategies perform vastly differently depending on the underlying system architecture, ranging
16%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
that perform the same type of numerical algorithm used in the HPL benchmark (linear algebra), then using HPL as a final arbiter of price-to-performance could lead to disappointment. Additionally, International
16%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
can be configured and then monitored. Bit by bit, a schemata of your environment develops, which usually leads to a better understanding of your IT environment than would be possible with a patchwork

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice