Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (383)
  • Article (109)
  • News (27)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 Next »

17%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
container images, and podman pull nginx:alpine downloads the nginx:alpine image from one of the registered container repositories. A Podman Compose [3] solution also processes docker-compose.yml files
17%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
edition, which was published early last year. The first edition, available online refers to Lua 5.0. The language has now moved to version 5.2, but the online book is still up to date to a large extent
17%
Automation with PXE Boot
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Sergey Jarochkin, 123RF.com
will not complete automatically. A key component of the PXE environment is a DHCP server. To make PXE work, you need to set up additional configuration options within the DHCP server configuration (Figure 3
17%
Controlling virtual machines with VNC and Spice
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Oleg Doroshin, 123RF.com
52). Figure 2: QXL driver problems on Windows 7. Conclusions The graphics system plays a subordinate role in server use scenarios; in fact
17%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
fingerprint is 87:17:c3:92:44:ba:1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue connecting (yes/no)? This prompt wants to establish a permanent secure key between the two hosts for future
17%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c3:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue
17%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
)*   Julia Python MATLAB Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31
17%
How to query sensors for helpful metrics
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by patricia serna on Unsplash
need a server with a network bridge and a Podman network of the Bridge [3] type. You will find various how-tos online to help you create a bridged container network of the macvlan type. However, if you
17%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
is the community open source version of the project, and Alien Vault Unified Security Management (USM) [3] offers even more in the way of features, scalability, and support. Additionally, it is worth noting that all
17%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
with the letters DAL , issue the command (in Cygwin): bash-3.2$ net view | grep -i DAL \\DAL01 \\DAL02 \\DALAUTO \\DALV01 The only thing you have to remember when dealing with Windows systems in Cygwin’s Bash

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice