Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 72 Next »

15%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
it. Thanks to extensive logging capabilities, you can quickly find the root cause of any problem. In the case of the Koha library system, GreenSQL had difficulties with the set autocommit = 1
15%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
with capabilities that are not immediately apparent. Although IPRoute2 is already used in many scenarios behind the scenes, its use at the command line has not quite taken root in the minds of many administrators
15%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
from source in a jiffy but is also included in most Linux distributions. A call to: luarocks searches in the repositories, and luarocks install installs it locally. Root
15%
Zero-Management Databases
02.10.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
to list and manage a database instance, manage users, and enable root access. This private beta is by inviation only at present, and they say they’re working on “storage scaling, configuration management
15%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
. The following Cron entry spawns the script to fix that issue: # Flush PortSentry of LAN IPs */10 * * * * root /etc/portsentry/perm_ban_length The script in Listing 2 then runs through each of the blocked files
15%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
to copy Windows boot files to the root of the bootable USB drive: C:> BCDBOOT.EXE E:\WINDOWS /S E: /F ALL Boot files successfully created. This command transfers the boot or system files to the USB Drive
15%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
or optional settings, such as the time zone, the locale, or the root password. For manual partitioning, you click on Installation destination on the Anaconda main installation menu and then select the desired
15%
The Road to End-of-Scale
19.06.2013
Home »  HPC  »  Articles  » 
is roughly proportional to the square root of the increase in complexity, suggesting that each new generation increases processor performance by a factor of two. Thus, if you were to apply this rule and allow
15%
Virtual Desktop
25.08.2011
Home »  Articles  » 
 
concept of VDI differ from other thin-client terminal service scenarios discussed in the past? A: Thin clients trace their roots back to dumb terminals used to access large monolithic systems
15%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
generated previously to connect with the machine: ssh ii rwartala_key.priv root@10.0.0.3 That's it! Behind the Scenes When new technologies are introduced, people always ask themselves it they are really

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 72 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice