Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 171 Next »

23%
Jelastic: Java and PHP as a service
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Melinda Nagy, 123RF.com
the services you use within the Jelastic cloud. Understanding Cloudlets The service is based on technology from Parallels [4], which calls appliances "containers" ("cloudlets" in Jelastic parlance), which
23%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
service ssh restart At this point, if you have any issues logging in, take a look at the documentation from the Raspberry Pi organization [4]. The next step in securing the Raspberry Pi and collecting
23%
VPN clients for Android and iOS
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © fckncg, 123RF.com
established connections to a third-party server using the IPsec protocol. The test devices were an Apple iPad with the latest iOS 9 and a Samsung smartphone with Android 4.0.4, which at the time were the most
23%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
Heartbleed in 2014, a vulnerability in OpenSSL, and Log4j in 2021. In both cases, innumerable systems were affected. Back in May 2021, the United States introduced an obligation to provide a software bill
23%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
4GB 1GB Flash 1GB 2GB 2GB 8GB 0GB Speaker Yes Yes Yes Yes Yes Card reader No Yes
23%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
on the client and PowerShell v4 on the server. Administration via a CSV File In PowerShell remoting, a distinction is made between 1:1 and 1:n (fan-out) relationships. 1:1 remote management is implemented
23%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
by convention – but not necessarily – is imported using: import numpy as np Multidimensional matrices are created in a similar way, that is, with nested lists: np.array([[1, 2, 3], [4, 5, 6]]) If the content
23%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
. Lower down in the file, you will also see some parameters that determine the behavior of Glance’s rbd back end. For example, you can set the name of the pool that Glance will use (Figure 4). The example
23%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
to VRDP support, you can access the virtual machine consoles in your browser with phpVirtualBox. Free or Not Free? Up to version 4.0 of VirtualBox, both a commercial and an open source edition (OSE
23%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
). The example assumes a username of admin ; first you need to discover admin’s password: ceph-authtool --name client.admin --print-key /etc/ceph/keyring.admin The example uses AQBNTxZRWId7JxAA/Ac4ToR7Zf

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice