Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (696)
  • Article (207)
  • News (39)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 95 Next »

17%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
; in Listing 3, the bridge device is then configured with its IP address and other parameters. Listing 2 Network Configuration (1) [Match] Name=enp2s25 [Network] Bridge=docker0 Listing 3
17%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
] Name=docker0 [Network] DNS=192.168.100.1 Address=192.168.100.42/24 Gateway=192.168.100.1 Listing 3 Network Configuration (2) [Match] Name=enp2s25 [Network] Bridge=docker0
17%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, for example, the waste of storage space and energy and the unnecessary effect on service life when writing to SSDs. When you transfer 1MB to an SSD, the drives actually writes considerably more data
17%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
processor managed only 0.9GFLOPS per watt with a total capacity of 85GFLOPS. Unfortunately, the Polaris was extremely difficult to program and was never available as a commercial product – only five people
17%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
into a ZIP archive: zip Ubuntu12041.zip /boot/System.map-3.2.0-29-generic module.dwarf This kernel profile should then be moved to the volatility/plugins/overlays/linux/ directory. The analysis feature
17%
High-Performance Python 4
14.10.2019
Home »  HPC  »  Articles  » 
is a simple broadcast (bcast ) of a Python dictionary: from mpi4py import MPI comm = MPI.COMM_WORLD rank = comm.Get_rank() if rank == 0: data = {'key1' : [7, 2.72, 2+3j], 'key2' : ( 'abc', 'xyz')} else
17%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
on the client and PowerShell v4 on the server. Administration via a CSV File In PowerShell remoting, a distinction is made between 1:1 and 1:n (fan-out) relationships. 1:1 remote management is implemented
17%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
the hosting version, which is mainly intended for providers, you can choose the server or advanced server versions. The community version [3] is similar to the server version and has no restrictions
17%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
to, say, /dev/vtbd0 and /dev/vtnet0, which means adjusting the /etc/fstab file to match. Figure 3 shows the typical kernel boot messages. Listing 1 Virtio in /boot/loader.conf #Init Virt
17%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
as an option and then generate the hash, for example, with sha1sum for SHA-1: echo -n "magazine" | sha1sum This entry in the users file, ADMIN SHA-Password := "e3d5a52968cef277f476a78124d8e05f1d558953

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice