Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (641)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 85 Next »

15%
Virtual Desktop
25.08.2011
Home »  Articles  » 
 
concept of VDI differ from other thin-client terminal service scenarios discussed in the past? A: Thin clients trace their roots back to dumb terminals used to access large monolithic systems
15%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
generated previously to connect with the machine: ssh ii rwartala_key.priv root@10.0.0.3 That's it! Behind the Scenes When new technologies are introduced, people always ask themselves it they are really
15%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
string. To start the script, store it as hello.lua in the document root (if you followed the “Quick Install” example, this is ~/httpd/htdocs ). Now you can access the function in your browser by typing
15%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
that doesn't use raw packets but instead triggers the operating system to make a connection. The second – and both types appear to need root privileges, incidentally, at least on my desktop – is a -sS scan
15%
How Linux and Beowulf Drove Desktop Supercomputing
17.02.2021
Home »  HPC  »  Articles  » 
movement, its roots definitely started there. In 1997, Eric Raymond published an essay, “The Cathedral and the Bazaar” (later published as a book), which was based on his experiences in the open source
15%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
 mpirun [...] ./mpiapp.exe Notice that both commands are run as a user – elevated or root privileges are not required, which goes back to Remora’s design of focusing on and providing users with useful information. The code
15%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
installed into /usr/local/anaconda3  by root . The startup definitions for Anaconda were in my .bashrc file, so it ran just fine before building legate.core . The laptop I used has the following
15%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
has already shifted a fair distance away from its roots; many new features have been added to Lavabit components, and the other parts of the suite are already more than just good ideas. Levison himself
15%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
with the root privileges required to select the scheduling. The call of the function sched_setattr() takes place in the example within the separate function run_deadline(), which the code starts in line 99
15%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
option for partitioning your storage device. After you select this option, the installer creates an encrypted root partition and a swap partition on the device, unless you explicitly specify otherwise

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice