Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 101 Next »

15%
SmartOS: Cool Cloud Platform Rises from the Ashes of Solaris
10.06.2014
Home »  Articles  » 
, by calling: vmadm console However, the guest must then be configured so that a getty (get teletype) process is listening for a login on the first serial port. Alternatively, SmartOS offers Remote
15%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
-time passwords and authentication information of the users and then passes it to the appropriate application via an interface. The universal interface is often the RADIUS protocol (Remote Authentication Dial
15%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
, which is not really secure, so I chose to exclude it from the configuration. In the output below, you can see the pdsh rcmd modules (rcmd is the remote command used by pdsh). [laytonjb@home4 ~]$ pdsh
15%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
quickly you can’t read it.  Popular for a Good Reason  Once you are used to the configuration file format and have figured out how to set up SNMP communities on a remote (or local) device, MRTG (http
15%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
or remotely and open a Terminal window. Most Unix server systems don’t have a Window manager or graphical desktop installed, so you might already be at a command line as soon as you log in. Also note
15%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
, which uses the gossip protocol to manage membership and broadcast messages to the cluster. Requests are relatively fast, because the data is not replicated across data centers. When a request for a remote
15%
Hardware suitable for cloud environments
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Orlando Rosu, 123RF.com
usually comes into play because different rules apply to external, as opposed to internal, connections. VMs must then be operated twice, depending on the target. Special Hardware for Remote Access Finally
15%
Tinkerbell life-cycle management
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Bee Felten-Leidel on Unsplash
, it can be installed automatically and remotely at the push of a button. As part of this process, the machine is also equipped with the appropriate software; a short time later, it is up and ready
15%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
functionality; it is not intended for production use. Listing 3 BGP Config Snippets 01 #FRR1 02 router bgp 65540 03 neighbor LAB peer-group 04 neighbor LAB remote-as 65541 05 neighbor LAB
15%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
the processor and significantly shortens queues and processes. This approach, in turn, increases the speed of the operating system and the various services such as Hyper-V. Remote Direct Memory Access (RDMA

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice