Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (479)
  • Article (97)
  • News (15)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 60 Next »

14%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
MAXJPEwna184sRuU6QGYWnccTAyJhpzYQ+AsfK8eZVYS 12 iA2g8G24ZIvMrzOp6KQdx0XET6/QIO5xD7B0QH9YNXatVsXtzce+9Q9X 13 klmc78oKRKrVw969aEX91kjRXf6pjRXckJxXdXetxzuL6/E4bMKjQCGX 14 yJI20TGx Confirming the keys follows
14%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
these web-free applications a "digital environment" or "offline business data." A quote from the Analytics Academy, Lesson 1.2, says: "You can even use Google Analytics in really creative ways to collect
14%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
integration. Inktank, the company behind Ceph, offers complete packages for all the major enterprise distributions at [12]. The only disadvantage is that Ceph currently lacks a GUI – unless you have a support
14%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
/joe/.ssh/google_compute_engine -A -p 22 joe@1.2.3.4 -- 11 Warning: Permanently added '1.2.3.4' (ECDSA) to the list of known hosts. 12 Enter passphrase for key '/home/joe/.ssh/google_compute_engine': 13 Linux gcerocks-instance-1 3
14%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
/ioutil" 09 "log" 10 ) 11 12 type Config struct { 13 Reviews map[string][]string 14 } 15 16 func main() { 17 yamlFile := "reviews.yaml" 18 data, err := ioutil.ReadFile(yamlFile) 19 if err != nil { 20
14%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
the approach introduced by Canonical with Ubuntu 12.10, in which only the bootloaders, but not the kernel, are signed. Compared with Canonical's approach, which only ensures that Ubuntu will start on Windows 8
14%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
= response.headers().map(); 10 for (String key : headers.keySet()) { 11 LOG.info(key + " : " + headers.get(key)); 12 } 13 14 String body = response.body(asString()); 15 LOG.info("body : " + body
14%
Linux and Windows client management with opsi
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © alexutemov, 123RF.com
.key | apt-key add - 08 $ apt-key list 09 ... 10 11 $ aptitude update 12 $ aptitude safe-upgrade 13 $ aptitude remove tftpd 14 $ update-inetd --remove tftpd 15 $ aptitude install opsi-atftpd 16 $ aptitude
14%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
08 default: 09 $(MAKE) -C $(KDIR) M=$(PWD) modules 10 endif 11 12 clean: 13 rm -rf *.ko *.o *.mod.c *.mod.o modules.order 14 rm -rf Module.symvers .*.cmd .tmp
14%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
of Ubuntu, 10.04 (Lucid Lynx), which comes with Postfix 2.7 and Dovecot 1.2. In the following example, both components should be installed and functional, and the individual user accounts should come from

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice