Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1222)
  • Article (309)
  • News (201)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 174 Next »

17%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
. If a hostname is used it 06 * must match the reverse dns of the server. 07 * / 08 host = "10.42.0.1"; 09 10 /* passwords: the passwords we send (OLD C:) and accept (OLD N:). 11
17%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
. For example, [laytonjb@home4 ~]$ agedu -w Using Linux /proc/net magic authentication URL: http://127.0.0.1:42821/ A screenshot of the web browser output is shown in Figure 1
17%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
Types "Unified" -MailEnabled $true -SecurityEnabled $true -LabelId f460a5b0-8d8e-4ac1-bb92-afb9ea22f9da If you followed the steps and created the LabelActions as shown in the example, the labeled team
17%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
no overview of supported providers in the documentation. Outlook itself can be restricted significantly by applying rule 26190899-1602-49E8-8B27-EB1D0A1CE869 when creating child processes. Different rules
17%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
similarity value of 1.0 to the two rascals. Of course, this is not yet hard evidence of unfair practices, but the result at least shows where you could drill down further to reveal more evidence
17%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
, for a library that uses a specific compiler and MPI library, you would end up with a module names like atlas-3.10.0-opempi-1.6.2-open64-5.0 . The name is useful because it tells the user the library version
17%
Rocky Linux 9 (x86_64)
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Rocky Linux from scratch – thus avoiding end-of-life issues – and manages infrastructure and secure material like keys and secure boot shims. In version 9, you'll find: Linux kernel 5.14.0
17%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
! solution array 011 REAL(real8) :: tol=1.d-4, diff=1.0d0 012 REAL(real8) :: delta 013 REAL(real8) :: x 014 REAL(real8) :: pi 015 REAL(real8) :: exact 016 REAL(real8) :: pdiff 017 REAL(real4
17%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
the Debian-based, distributions install it along with openvpn – one exception being Ubuntu, which only offers easy-rsa starting with Cosmic Cuttlefish (Ubuntu version 18.10) [3]. The successor, Easy-RSA 3.0
17%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
boxgrinder-build --version 02 BoxGrinder Build 0.10.2 03 04 Available os plugins: 05 - rhel plugin for Red Hat Enterprise Linux 06 - centos plugin for CentOS 07 - fedora plugin for Fedora 08

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice