Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (48)
  • Article (16)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

29%
Warewulf 4
13.12.2022
Home »  HPC  »  Articles  » 
/6): tftp-server-5.2-24.el8.x86_64.rpm                         123 kB/s |  49 kB     00:00     (4/6): dhcp-server-4.3.6-47.el8.x86_64.rpm                       3.9 MB/s | 529 kB     00:00     (5/6): bind
29%
Wireshark
27.11.2011
Home »  Articles  » 
 
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
29%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
After installing WSL for container operation, you should always check for and install any Windows updates to be on the safe side. To use the new WSL2 version, the WSL2 Linux kernel update package for x64
29%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
virtualized guest systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself
29%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself, which
29%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
) (out= 131)(deflated 17%) adding: WEB-INF/(in = 0) (out= 0)(stored 0%) adding: WEB-INF/web.xml(in = 63) (out= 48)(deflated 23%) # cp helloworld.war ../../jboss-5.1.0.GA/server/all/deploy/ 20
29%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
into Red Hat's cloud stack (Figure 1). After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation for the new products
29%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
. qwerty123 Now I want to take a quick look at password protection and its uses. As with all of the Apache config options, you have a plethora of parameters to choose from, but I’ll only explore specific
29%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
is that the file absolutely must be called .htaccess, but that's not the case; with a quick change to the AccessFileName directive, you can specify different control file names to your heart's content. qwerty123
29%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
developments in the open source groupware alternatives PostPath, Kerio, Kolab, Open-Xchange, Scalix, Tine 2.0, Zarafa, and Zimbra. PostPath Somewhat unlucky in its hunt for customers, PostPath [1] used to have

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice