Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (559)
  • Article (159)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 76 Next »

15%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
. 25 26 Next Steps: Boot the zone, then log into the zone console 27 (zlogin -C) to complete the configuration process 01 # zoneadm -z web1 boot Listing 3 Interactive
15%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
magazine [6]. Infos PAL: http://pal.codeplex.com Log Parser 2.2: http://www.microsoft.com/downloads/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07&DisplayLang=en Office 2003 Add
15%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
['openssh-server'], 21 } 22 } By specifying a context within the SSH configuration file, Puppet instructs augeas to set the Protocol directive only if it differs from the desired value. This conditional
15%
Sharing Data with SSHFS
23.04.2014
Home »  HPC  »  Articles  » 
on your system. Almost all firewalls allow port 22 access, so you don’t have to configure anything extra, such as NFS or CIFS. You just need one open port on the firewall – port 22. All the other ports can
15%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
instructions, hunting down tools, and undoing missteps before you can enjoy your new furniture. Indeed, should you not have the mechanical inclination to put bolt A16 into offset hole 22, your new furniture
15%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
with OS fingerprinting. The following command executes a simple port scan on a chosen system: nmap -v -A www.haribo.de An abridged version of the output from this command is shown in Listing 1. Listing 1
15%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, they convert arbitrary input to fixed length output. The output is typically a hex number: for example, the MD5 hash of the word “Hello” is 8b1a9953c4611296a827abf8c47804d7. To be secure, a cryptographic hash ... SHA-3 – The New Hash Standard
15%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
($one, $two, $three) = map { $_ x 4096 } 'a'..'c';   $s .= $one; $s .= $two; $s .= $three;   my $temp; for (my $i=0; $i<12288; $i++) {    $temp=substr($s,length($s)-1,1);    $s=$temp.$s;    $s = substr($s,0,12288); }   $elapsed
15%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31.47 1,336.37 2
15%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
and doubles the cache size (from 3 to 6MB), in exchange for a small drop in baseline clock speed – 2.3 to 2.2GHz (peak drops from 3.2 to 3.1GHz). Major Surgery Legend has it that no one has ever opened

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 76 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice