Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (998)
  • Article (293)
  • News (145)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 145 Next »

16%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
. You must have at least version 1.1.6x of npm (try npm --version ). If not, GitHub has an informative page on how to install current packages for various distros. As soon as you have installed this duo
16%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
the fixed network template file specified in Listing 4, save the contents of Listing 4 to a file called network.template, and enter the commands shown in Listing 6. Listing 6 Creating a Virtual
16%
Virtualization with KVM
29.06.2011
Home »  CloudAge  »  Articles  » 
 
memory to the existing machines. Luckily, KVM became an official component of all Linux kernels as of version 2.6.20. In other words, you only need to install Qemu and a couple of tools. Most
16%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, 28 ports open for incoming connections, and 441 packages installed and not updated for a while. Listing 2: grep, ps and netstat example results user@metasploitable:~$ uname -a Linux metasploitable 2.6
16%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
, copyout, allocates memory on the accelerator when entering the accelerated region but only copies data from the accelerator to the host when exiting the OpenACC data region (Table 6). No data is copied from the host
16%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
as suspicious. Suricata has a stable code base, and it is used throughout the industry. Although hardly as widely adopted as Snort, Suricata has the ability to monitor both IPv4 and IPv6 traffic, as well
16%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
). Figure 5: Fourth line of output from Top while running an application. The fifth summary line (Figure 6) focuses on the swap space in the system. From left to right in my example are the total amount
16%
Adding high availability to a Linux VoIP PBX
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © MIR, Fotolia.com
to learn more is the VoIP-Info [6] or Server Fault [7] website. However, for a simple PBX cluster, the above information is sufficient to begin implementation. Installing Prerequisites For this example, I
16%
Six new security features for  Windows Server 2022
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
this isolated memory area. VBS requires UEFI version 2.6 or later with support for a memory attributes table (MAT), which ensures a clean segregation of the runtime memory areas of code and data. VBS forms
16%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
components. The easiest way to obtain them is via the Apt package management system: sudo apt-get update sudo apt-get --yes install openjdk-6-jdk To start, the simplest way is set up a single-node pseudo

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 145 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice