Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 186 Next »

13%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
downloaded the approximately 3MB ZIP file, create a folder before you unpack, because the archive does not contain one. If you simply unzip, all the files and directories end up in the current directory
13%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
based on a development by KVM specialist Qumranet. In 2008, Red Hat acquired the company and ported the software step by step from C# and .NET to Java. RHEV's current version 3.2 has been available since
13%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
licensed. NexentaStor [3] distinguishes between the Community Edition and the Enterprise Edition. The Community Edition is free, but not intended for production systems (which the EULA explicitly forbids
13%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
at level 3. To do this, each VLAN must have a connection to a router. VLANs do not protect networks against spying or sniffing, although they can be monitored like switched networks using data analyzers (e
13%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
you request information externally about CPU load, RAM, or disk space usage, you need to install a verbose add-on, such as NRPE [3], on each machine. The remote Icinga server will tell it to execute
13%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
the currently loaded modules in an environment variable called LOADEDMODULES . For example, if I load two modules (ftw and mpich2 ) and then look at my environment, I will find: LOADEDMODULES=fftw/3.3.2/gnu4
13%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31.47 1,336.37 2
13%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
the executable, will open a meterpreter shell on the victim’s Windows box (see Figure 3). Figure 3: msfcli multi/handler options (above) and executing the listener
13%
Rethinking RAID (on Linux)
16.03.2021
Home »  HPC  »  Articles  » 
=libaio, iodepth=32 fio-3.12 Starting 1 process Jobs: 1 (f=1): [w(1)][100.0%][w=1420KiB/s][w=355 IOPS][eta 00m:00s] test: (groupid=0, jobs=1): err= 0: pid=3377: Sat Jan  9 15:31:04 2021   write: IOPS=352, BW=1410Ki
13%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
dynamically by Windows depending on the utilization level [3]. WSL is still in its early stages, but Microsoft is actively developing the project and adding additional features, such as GUI support for a fully

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice