Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kind Man high line mind(711bmw.com)kind Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (339)
  • Article (86)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 Next »

12%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
to the overall center, but research and HPC require a different kind of service. Moreover, HPC centers can react much more rapidly to requests than the enterprise IT department. Time for a Change HPC is being
12%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
can use to describe and delimit network traffic for analysis. Zeek writes the metadata for monitored communications to a log that can be processed downstream for exactly the kind of thing that Security
12%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
-ADUser -LDAPFilter Get-ADObject -LDAPFilter You can also use it with the LDAP browser of your choice or with command-line search tools such as adfind [3] or dsquery [4]. Mitigating Attacks
12%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
at the data center [3]. To allow authorized users to work with the required programs and data, PCoIP can allow or prohibit looped USB devices explicitly. Workstation with Host Card With a host card, you can
12%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
. Often, when you have highly normalized data [2] in your database, "views" are used for convenience when querying the database. A view is kind of like a saved query. You can think of it as a particular
12%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
Panel's product line is Enkompass, essentially cPanel for users of Microsoft Windows Server products. Enkompass can manage multiple servers across an Active Directory domain. In this article, I will be focusing ... For companies that provide hosting and email packages to clients to administer a myriad of tasks, WHM and cPanel provide a web-based graphical control panel designed to help. ... cPanel ... cPanel
12%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
_GCPCPSTST FROM alpine:3.19 AS dockerize ENV DOCKERIZE_VERSION v0.7.0 RUN wget https://github.com/jwilder/dockerize/releases/download/$DOCKERIZE_VERSION/dockerize-alpine-linux-amd64-$DOCKERIZE_VERSION.tar.gz && tar
12%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
in the same group. Cluster analysis is a useful technique for this kind of problem, and KNIME has different nodes to support it, including k-means, fuzzy c-means, hierarchical agglomerative clustering, or k
12%
Installing and managing thedistributed GlusterFS filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Tetiana Pustovoitova, 123RF.com
add more servers or remove existing servers from the storage pool on the fly. GlusterFS works kind of like "RAID on the network," and if you look closely, you will discover many RAID concepts during
12%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
agentless, but with open interfaces that support the implementation of agents. SNMP can be queried in versions V1, V2c, and V3. The Nagios agents NRPE and NSClient++ can be fully utilized Agentless

« Previous 1 ... 35 36 37 38 39 40 41 42 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice