Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (77)
  • Article (3)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

28%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
which name server to use, or where the other network services are located. RFC 5006 [3] thus defines an extension to the router advertisements that lets the clients find the name server. Another important
28%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
expects as the PSK from the password of test123. I set the encryption algorithm for the first negotiation phase to 3DES and the hash algorithm for authentication was SHA1. The setting for PFS was set
28%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
Version 3.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network
28%
Intelligent Stack
07.12.2025
Home »  Articles  » 
Lead Image © antoinepham2903, 123RF.com
[1] openEuler Intelligence: https://www.openeuler.org/en/projects/intelligence/  [2] GMEM: https://www.openeuler.org/en/blog/G11N-SIG/20240116-memory-management/20240116-memory-management.html  [3
28%
Remote desktop based on HTML5
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Phanlop Boonsongsomnukool, 123RF.com
quickly view the password hash at the command line with the md5sum utility: # echo -n | md5sum -t 319f4d26e3c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password
28%
Introduction to OpenMP programming
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Frank Rohde, 123RF.com
[3] to solving the questions. Although not the most efficient or fastest method for solving the problem, it does illustrate how one can use OpenMP to parallelize applications. I will be using
28%
Modern network diagnostics on Windows and Linux
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Nk Ni on Unsplash
to focus on this protocol. One of the most commonly used flags is -n, which prevents the resolution of IP addresses into hostnames and ports into service names, ensuring faster execution and numerical
28%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
-certs, make, gcc, and g++. The certificates from ssl-cert will be required later. According to the how-to http://1, Chef prefers RubyGems version 1.3.6 or newer, but not 1.3.7. This version contains a bug
28%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
container. As its popularity increased and the server became more widespread, the JBoss community expanded and extended the product until, finally, application server version 3 (AS3) became a full
28%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [3] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ... 3

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice