Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (588)
  • Article (181)
  • News (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 Next »

17%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
Samba, dual-boot Windows 8 with Linux, and install Linux filesystem software on a Windows 8 system. Joining Windows 8 to a Samba 3.6.9 Domain You can
17%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
17%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
permanently, interoperability between the two worlds is ensured [6]. Thanks to wsl.exe, you can launch individual Linux commands (path specifications must, of course, follow the conventions for Linux) directly
17%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
rules still apply. The attacker cannot open port 22 to the outside by deleting the corresponding Netfilter rule to gain access to the system by SSH. How security groups can be used in AWS is explained
17%
Ceph object store innovations
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Max, fotolia.com
-source-based storage management. For some time, the openATTIC [6] beta branch has contained a plugin that can be used for basic Ceph cluster management, which is exactly the part of openATTIC in which SUSE
17%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
17%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
budget [5] – it's not only the capacity but also the performance that influences user acceptance. The network should not use legacy 10Mb technology, which is often encountered in the form of small
17%
Save money with Samba as the domain controller on a legacy Windows NT-style domain
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Bernad, fotolia.com
privileges. This means domain administrators must assign themselves this privilege. Listing 6 shows how a domain administrator would go about this. Listing 6 Assigning Privileges root
17%
More Best Practices for HPC Containers
19.02.2020
Home »  HPC  »  Articles  » 
(e.g., centos-7.6:tensorflow-2.0-0212020-Layton ), but such tags can be very useful. The previous example informs you that the distribution in the image is CentOS 7.6 and the image has TensorFlow 2
17%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
). By default, a session expires automatically after 12 hours. To continue, just press the Click login to continue button and log in again. You can also set your own time limits for sessions according to your

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice