Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (659)
  • Article (177)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 89 Next »

9%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
by the image with the previously announced size of 32,768 bytes. Listing 1 Opening a Page GET /trainings HTTP/1.1 Host: www.it-administrator.de User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64
9%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
Security X-Force in 2010 came to the conclusion that one third of all hypervisors suffer from vulnerability gaps [7]. Virtualizing a firewall on the same host as internal IT resources (e.g., domain ... 20
9%
Introduction to OpenMP programming
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Frank Rohde, 123RF.com
application. Today, it's very easy to get laptops with at least two, if not four, cores. Desktops can easily have eight cores with lots of memory. You can also get x86 servers with 64 cores that access all
9%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
backups are created faster. Duplicity is licensed under the GNU GPL and thus can be used free of charge. Duplicity is tailored for Linux and other Unix operating systems, such as BSD or OS X. Most major
9%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
output similar to ed25519 2022-08-29 [SC] [expires: 2027-08-20] uid [ultimate] Name name@example.org updgef8corpy81hia1rhd8npqiti6nzf @example.org In the output you will see a 32-character string
9%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
help point out which line is the culprit. Simply run your script as follows: # bash -x ./bandwidth_throttler Typing dmesg could give direct feedback from the kernel too. Cooking with Gas Now I
9%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
:%02x%02x\n' 19 83 20 235 Note that 6to4 relays (the machines that handle your traffic) use the anycast address of 192.88.99.1 (2002:c058:6301::), so finding out who is actually handling your traffic
9%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
For 20 years, FreeBSD [1] has been an efficient, secure, and stable open source operating system. Now version 10 has been released with some innovations. FreeBSD is part of the Unix family ... The Unix-like FreeBSD is viewed as highly reliable and forms the underpinnings of both Mac OS X and the Sony PlayStation 4. Version 10 introduces new features and performance gains.
9%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
). That supercomputer was expensive. A predecessor to the Y-MP, the X-MP, sold to a nuclear research center in West Germany for $11.4 million in 1981, or $32.6 million in 2020 dollars (see The Supermen  by Charles J
9%
Zarafa on the Univention Corporate Server
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Andres Rodriguez, 123RF.com
.list file below /etc/apt/sources.list.d/, taking care that its name starts with a number greater than the last existing source list file (typically 20) – for example, 25_zarafa4ucs.list. Depending on the UCS

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 89 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice