Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (414)
  • Article (123)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 Next »

17%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
for each class, and the recommended values (decimal and binary) of AF codepoints. Table 1 Assured Forwarding Codepoints Priority Level Class 1 Class 2 Class 3 Class
17%
Small Tools for Managing HPC
18.10.2017
Home »  HPC  »  Articles  » 
a000)         libpgc.so => /opt/pgi/linux86-64/16.10/lib/libpgc.so (0x00007f5bc4fc2000)         librt.so.1 => /lib64/librt.so.1 (0x00007f5bc4dba000)         libm.so.6 => /lib64/libm.so.6 (0x00007f5bc4
17%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
an alternative that has more security. SSHFS Filesystem in Userspace (FUSE) [3] offer several attractive features. Such filesystems are easy to code because they are in user space (have you tried getting
17%
Exploring PowerDNS
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © ladyann, 123RF.com
and records DNSSEC support (as of 3.x) Web-based management options DNS data stored in plain text (BIND compatible) IPv4 and IPv6, UDP/TCP, 100% compliant [3] MySQL, Postgre
17%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
. One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established
17%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
are not defenseless: The Enhanced Mitigation Experience Toolkit (EMET) has had a function similar to pinning since version 4.0 [3]. Until recently, the server was basically defenseless against these attacks. All data
17%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
at least two other recent tools that, according to their brief descriptions, would be suitable for the task I set: DocFetcher [2] and Recoll [3] specialize in full-text search and were built for use
17%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
@trapper:~\$ " send -- "ssh aspen\r" expect -exact "ssh aspen\r khess@aspen’s password: " send -- "PASSWORD\r" expect -exact "\r Linux aspen 2.6.32-43-server #97-Ubuntu SMP Wed Sep 5 16:56:41 UTC 2012 x86_64 GNU
17%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
Samba, dual-boot Windows 8 with Linux, and install Linux filesystem software on a Windows 8 system. Joining Windows 8 to a Samba 3.6.9 Domain You can
17%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
are over i = 2,n − 1 and j = 2,n −1. Here is how you can write the iteration over the domain using array notation: a(2:n-1,2:n-1) = 0.25 * &     (a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice