Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1182)
  • Article (278)
  • News (128)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 160 Next »

27%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
and maintained only by Red Hat. In more recent versions (e.g., 2.0 in RHEL 5 and Fedora Core 6 or later), the legacy CMAN implementation was replaced by an open implementation based on the Application Interface
27%
Microsoft Exchange 2010: The Highlights
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© peapop, Fotolia.com
with Windows Mobile 6.5, they can now synchronize text messages with their Exchange mailbox, along with email messages, contacts, appointments, and tasks. Exchange previously did not offer an option for sending
27%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
anywhere in the code. It could also be used for a numerical label. Column 6 was reserved for a continuation mark, so that lines that were longer than one line could be continued. The code began in column 7
27%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
. You must have at least version 1.1.6x of npm (try npm --version ). If not, GitHub has an informative page on how to install current packages for various distros. As soon as you have installed this duo
27%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
the fixed network template file specified in Listing 4, save the contents of Listing 4 to a file called network.template, and enter the commands shown in Listing 6. Listing 6 Creating a Virtual
27%
Virtualization with KVM
29.06.2011
Home »  CloudAge  »  Articles  » 
 
memory to the existing machines. Luckily, KVM became an official component of all Linux kernels as of version 2.6.20. In other words, you only need to install Qemu and a couple of tools. Most
27%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, 28 ports open for incoming connections, and 441 packages installed and not updated for a while. Listing 2: grep, ps and netstat example results user@metasploitable:~$ uname -a Linux metasploitable 2.6
27%
HDF5 and Parallel I/O
17.05.2017
Home »  HPC  »  Articles  » 
       USE HDF5 ! This module contains all necessary modules 5       IMPLICIT NONE 6 7       INCLUDE 'mpif.h' 8 9       INTEGER :: NUMTASKS, MPI_RANK, LEN, IERR , MPIERROR, INFO, C_LEN 10      INTEGER
27%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
, copyout, allocates memory on the accelerator when entering the accelerated region but only copies data from the accelerator to the host when exiting the OpenACC data region (Table 6). No data is copied from the host
27%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
as suspicious. Suricata has a stable code base, and it is used throughout the industry. Although hardly as widely adopted as Snort, Suricata has the ability to monitor both IPv4 and IPv6 traffic, as well

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice