Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (654)
  • Article (214)
  • News (21)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 90 Next »

18%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
. Depending on the manufacturer and the method used, a distinction is made between time-based or time-synchronized tokens, TOTP (time-based one-time password algorithm, as defined in RFC 6238 [12]), and event
18%
Sustainable Kubernetes with Project Kepler
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Hassan Pasha on Unsplash
Chromebox with Skylake architecture – gives the results shown in Figure 4, which is an approximately 12.5W power increase over a six-minute period, or 0.49g of CO2. This setup at least shows that you get more
18%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
operating systems. However, while the most recent Linux versions offer both current and legacy versions of Python (Figure 1), the latest version on Mac OS (Mac OS 10.12 Sierra) only offers the legacy version
18%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
 __name__ == '__main__':       # Main dictionary     d = {};       # define interval and add to dictionary     interv = 0.5;     d['interval'] = interv;          # Number of cores:     N = psutil.cpu_count();     d['NCPUS'] = N
18%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
can manage the whole deployment and hardware configuration with PowerShell commands. For instance, you can create a new machine with the command: > new-vm -Name win8 -MemoryStartupBytes 512MB -Boot
18%
OpenMP – Coding Habits and GPUs
13.06.2019
Home »  HPC  »  Articles  » 
(i,j) = B(i,j) + C(i,j)    enddo enddo #pragma omp for collapse(2) for ( i = 0; i < N; i++ ) {   for ( j = 0; j < N; j++ ) {     A[i][j] = B[i][j] + C[i][j]    } } The collapse  clause has some restrictions. One
18%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
-hacking-exploit.html), there are more than 500 million WinRAR users in the world, and all these users are now at risk of compromise. A 19-year-old bug was discovered in WinRAR that allows hackers to execute arbitrary code on a targeted
18%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
at least outputs some information. What you need is access to the filesystem, which could reside in 06:zfs0; however, to determine the name of the pool, you need a zpool import (Listing 2). The name
18%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
root. 10 node-builder_1 | To override this, specify the homepage in your package.json. 11 node-builder_1 | For example, add this to build it for GitHub Pages: 12 node-builder_1 | 13 node-builder_1
18%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
to "0" to make the # command run *after* the blocking has occurred. # KILL_RUN_CMD_FIRST = "0" # # KILL_RUN_CMD="commands_to_run" Customization I came across a few limitations with the way a third

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 90 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice