Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3 09 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (67)
  • Article (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9

38%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
) [application/octet-stream] Saving to: Rocky-8.6-x86_64-dvd1.iso   Rocky-8.6-x86_64-dvd1.iso     35%[===========>                         ]   3.74G  37.4MB/s    eta 2m 45s When you reconnected to the session, you didn’t specify
38%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
is a key part of securing an estate. Common Vulnerabilities and Exploits (CVEs) [3] are the most popular way of listing, publishing, and categorizing security bugs. Within Prisma Cloud Compute, you can
38%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
containers (Figure 3) – that is, completely virtualized operating systems – and application containers (Figure 4) for virtualizing a particular application, including its run-time environment. However, LXC
38%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
================================================================================ dynamic_hosts data 0 0.3 /etc/hosts passwd data 0 1.9 /etc/passwd group data 0 0.9 /etc/group shadow
38%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Dec 9 09:11 microsoft.gpg which means only the root user can read and write to the file. The next step sets up the correct Apt package repository entry, which is ideal for security updates, new
38%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Number: 00282-30340-00000-AB9A5 Version: 6.3.9600 The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
38%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
08 # Network information 09 network --device=bond0 --bondslaves=ens1f0,ens1f1 --bondopts=mode=802.3ad,miimon-100 --bootproto=dhcp --activate 10 network --hostname=server.cloud.internal 11 network
38%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
NEW packages will be installed: libdate-manip-perl libyaml-syck-perl logwatch As a result, about 12.5MB of new software is installed. Logwatch gets configuration details several ways: from script

« Previous 1 2 3 4 5 6 7 8 9

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice