Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (628)
  • Article (170)
  • News (101)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 90 Next »

10%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
of options, including dual four-core Xeon, dual six-core Xeon, or quad 12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per
10%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
, improving on the concept by fixing [12] several problems in Jupyter's design. Whereas Jupyter can serve as an interface to many different languages (the name is a mashup of Julia, Python, and R, its original
10%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
servers and sysadmins. These levels of growth always sound absurd when peddled by analysts. Cisco predicts 50 billion devices by 2020 compared with 12.5 billion in 2012. To get some intuition about
10%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
10%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
Name ------- ------ ----- ----- ----- ------ -- ----------- 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 74 9 1464 2568 42 0.09 2172 armsvc 195 10 2380 2984 62
10%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
Control Manager on computer 'XENAPP0'. This operation might require other privileges. At line:1 char:12 + Get-Service <<<< -ComputerName XENAPP0 + CategoryInfo : NotSpecified: (:) [Get
10%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
, the users from the admin group and sudo , can do everything, and the remaining users can do nothing. Listing 1: Ubuntu 12.04 /etc/​sudoers file # Redefine environmental variables: Defaults        env
10%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator and Mydigipass.com. Info [1] RSA Security [2] SafeNet [3] SMS Passcode (in German) [8] LSE LinOTP [9] Mobile-OTP [10] Mydigipass API [11] Demo token [12] Vasco [13] Mydigipass plugins
10%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
the /dev/ pmem pseudodevice, which you can leverage to dump the memory content with dd . Figure 1 shows the complete process for an Ubuntu 12.04.1 LTS system
10%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
[inst.id] = inst.state 08 summary[inst.state] += 1 09 state 10 end 11 total = summary.values.inject(0) { |sum, i| sum += i } 12 puts "Found #{total} instances in the following states:" 13 summary

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 90 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice