Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%25390 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (481)
  • Article (140)
  • News (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 Next »

16%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
and Brotli Comparison 01 -rw-r--r-- 1 sw sw 124 8 Sep 16:52 hello-world.html 02 -rw-r--r-- 1 sw sw 77 8 Sep 16:53 hello-world.html.br 03 -rw-r--r-- 1 sw sw 113 8 Sep 16:53 hello
16%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
kernel ordinal number (%n). Listing 3 70-persistent-net.rules Rules for KVM: SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="52:54:00:*", KERNEL=="eth*", NAME="eth%n" Rules
16%
Tech News
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
 
a free "AI in Networking for Business Leaders" (https://www.juniper.net/us/en/services/services-for-campus-and-branch.html) course, along with "a range of hands-on classes and actionable certifications
16%
Controlling virtual machines with VNC and Spice
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Oleg Doroshin, 123RF.com
52). Figure 2: QXL driver problems on Windows 7. Conclusions The graphics system plays a subordinate role in server use scenarios; in fact
16%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
assistance, and Gauntlt offers some helpful debugging advice. Listing 4: Attack File Errors and Instructions Feature: Run sslyze against a target     Background:                   # sslyze.attack:3
16%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
="filtered" reason="no-response" reason_ttl="0"/>
16%
How to query sensors for helpful metrics
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by patricia serna on Unsplash
--name flux18 --volume /var/pods/flux18/etc:/etc/influxdb:Z --volume /var/pods/flux18/data:/var/lib/influxdb:Z --net pub_net --ip 192.168.2.81 --mac-address 52:54:C0:A8
16%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
(Community edition), AGPLv3 (Advanced and Enterprise editions), commercial AGPLv3 or commercial AGPLv3 or commercial LGPL Revised BSD Interfaces Java, Ruby, Python, C
16%
Combining Directories on a Single Mountpoint
19.05.2014
Home »  HPC  »  Articles  » 
output from the mux. Here’s is a simple text diagram from the SSHFS-MUX website that illustrates how this works:    host1:         host2:                host3:  directory1     directory2
16%
Guacamole: Remote Desktop
04.02.2013
Home »  Articles  » 
 
with the md5sum utility: echo -n | md5sum -t 319f4d26e3c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password to the configuration. Of course, the hashed password should

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice