Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (531)
  • Article (144)
  • News (102)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 78 Next »

15%
Plundering treasures with Gitrob
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © pip, photocase.com
(insert your own token, of course): $ export GITROB_ACCESS_TOKEN=8XXXXe15a9decXXXXXXXXXX358bf3XXX Now, if you run ./gitrob again on the command line without options, you should see a very welcome piece
15%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
Flow data should be visible in the Linux console after a short time. (See the "NetFlow Configuration" box.) NetFlow Configuration Example of a configuration for a Cisco router 1921 with IOS 15
15%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
because you do not need any CALs here. This means you can only connect 25 (Essentials) or 15 users (Foundation). Furthermore, the servers are only allowed a maximum of two processors (Essentials) or one
15%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
.translation embeddedmap; 09 10 create class Relation extends E; 11 create property Relation.from date; 12 13 create class Appear extends E; 14 create property Appear.chapter embeddedlist integer 15 16 insert into Person
15%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
available through the test drive GUI explains how this works. All told, testers can put RHSS through its paces for 15 hours, divided into three separate test runs, each lasting no longer than five hours
15%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
software tools also integrate wikis as a knowledgebase component. Ticketing systems designed for bug reporting, such as MantisBT [14] and Roundup [15], let you integrate wiki engines, although this can
15%
Database availability groups – High availability with Exchange Server 2012
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Pavel Isupov, 123RF.com
switch to the script folder for Exchange 2013 Exchange Management Shell C:\Program Files\Microsoft\Exchange Server\V15\Scripts), you can enter .CheckDatabaseRedundancy.ps1 to test the replication. If you
15%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
1048576000 sectors 13 Units = sectors of 1 * 512 = 512 bytes 14 Sector size (logical/physical): 512 bytes / 4096 bytes 15 I/O size (minimum/optimal): 4096 bytes / 4096 bytes 16 Disk identifier: 0x00000000 17
15%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
/ioutil" 09 "log" 10 ) 11 12 type Config struct { 13 Reviews map[string][]string 14 } 15 16 func main() { 17 yamlFile := "reviews.yaml" 18 data, err := ioutil.ReadFile(yamlFile) 19 if err != nil { 20
15%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
.org/ntopng/securing-ntopng-with-ssl-and-lets-encrypt/ The Author Thomas Zeller is an IT consultant and has been involved with IT security and open source for 15 years. He is the author and coauthor of OpenVPN Compact and Mind Mapping with Freemind . In real

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice