Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 132 Next »

15%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
in memory. Fortunately, the administrator does not need to worry about this seemingly hopeless mission. This job is handled by the kexec command and the kexec_load system call. The former loads the new
15%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
– in this example it is called ubuntu-amd64-alice.xml – would look like Listing 1. Listing 1: VM Storage as a Block Device
15%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
of additional authentication factors. Authentication Methods Various authentication methods can be categorized into the groups “knowledge,” “possession,” and “biometrics” (Table 1). These groups, also called
15%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
between two communication partners will be maintained as a matter of course, despite a changing network connection. This principle is called roaming (Figure 1
15%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
grep -r '/var/www/twiki' /etc/apache2 and looking up the collected earlier process list and services list reveals that I have happened onto the wiki called Twiki, which should be available through HTTP
15%
Nmon: All-Purpose Admin Tool
17.12.2014
Home »  HPC  »  Articles  » 
performance from many perspectives (i.e., CPU, network, disk). The tool is called nmon . Nmon Overview Nmon is short for “Nigel’s Monitor” and is a command-line tool that presents performance information
15%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
/gv0/ Here, the gluster3 system is added to the storage pool to expand the existing volume by one brick. A call to gluster volume info should confirm that the volume now has three bricks. Depending
15%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
/O scheduler, which has the ability to sort the incoming I/O request into something called the request queues, where they are optimized for the best possible device access. Two types of I/O schedulers exist
15%
Tools to Manage Storage
03.02.2024
Home »  HPC  »  Articles  » 
. To use the Quota subsystem, install the quota  tools with the package manager of your distribution. Many times, the package will just be called quota . After installation, run the command quota --version
15%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
benefit from this behavior just as some access providers do. They filter SMTP connections in the firewall (called SMTP fixup by Cisco), in the desktop SMTP proxy (McAfee), or on WAN connections [1

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice