Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 149 Next »

14%
Fedora 20
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
detection Network statistics Password cracking Reconnaissance Wireless analysis Web app testing VoIP traffic generation
14%
SystemRescueCd (Live, 64-bit)
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
and GPLv3 license. It supports numerous filesystems (e.g., ext3/ext4, XFS, Btrfs, ReiserFS, JFS, VFAT, NTFS), including network filesystems such as Samba and NFS. The new version 6.0.3 is updated to Linux
14%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
install a temporary local boot medium (e.g., a USB stick) manually, that's precisely what you would want to avoid. An alternative approach to installing the system would be booting via a network – not a new
14%
On the DVD
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
for privacy include: Iceweasel web browser with HTTPS Everywhere Pidgin messenger Claws mail client KeePassX password manager GnuPG data encryption I2P anonymizing network TrueCrypt disk
14%
New Products
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
to increase detection accuracy and avoid network disruption. Each alarm from AlienVault USM includes detailed and customized instructions on how to investigate and respond to the detected threat. A free trial
14%
Data Center Transformation: The End of IT?
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © zelfit, 123RF.com
updates for the server's hardware, you have to update the blade enclosure's BIOS, the virtual console's BIOS, the network module's BIOS, each blade's BIOS, and still update your blade's operating systems
14%
On the CD
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
the tools you need to deploy a complex network of services, with the ability to build highly available, secure, and flexible OpenStack production clouds and to collaborate with VMware vSphere. Freely
14%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
Network You can similarly define unit files for volumes, networks, pods, and more. As an example, I'll define a Podman network in a systemd unit file. Instead of letting all your containers publish
14%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
were largely identical to the cores of the Pentium-S processors and communicated with each other via a high-speed network connection and four DDR-3 memory channels. Intel manufactured a few hundred SCCs
14%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
-performance computing (HPC) system, and the readings are resource aspects of the system (e.g., CPU, memory, network, and storage usage, etc.). Here, the telemetry is used to help the user understand what

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice