Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%25390 Llorente"500 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (403)
  • Article (157)
  • News (50)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 62 Next »

28%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
use generic-service 21 host_name w2k12srv 22 service_description Memory Usage 23 check_command check_nt!MEMUSE!-w 80 -c 90 24 } 25 define service{ 26 ... 25
28%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
for VirtualBox 14 - virtualpc plugin for VirtualPC 15 16 Available delivery plugins: 17 - s3 plugin for Amazon Simple Storage Service (Amazon S3) 18 - cloudfront plugin for Amazon Simple Storage
28%
Benchmarking a new architecture
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
3.0 (OTG and flash support) Video Micro-HDMI Power 5V, USB or 2.1mm barrel connector Other 2 CSIs, 1 DSI   I2C, UART, SPI, ADC, PWM, GPIO
28%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
as the user name. Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
28%
What Is an Inode?
23.03.2022
Home »  HPC  »  Articles  » 
 13  2020 iozone3_490 31888630 -rw-rw-r--.  1 laytonjb laytonjb  4136960 Dec  9  2020 iozone3_490.tar 31984747 drwxrwxr-x  21 laytonjb laytonjb     4096 Nov 20  2020 Lmod-8.4.15 31863444 -rw-rw-r--   1
27%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
guest 82a84,88 > > tee /etc/.htpasswd <<'EOF' > guest:$apr1$gz4n7s6o$P.O/V1k9rZuV9nN/5lh3l0 > admin:$apr1$esczj7wu$ffu/6j8vETMAMJaVTKn7a1 > EOF Monit is configured to load service
27%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
of storage space for email and 500GB for Office documents, which is reflected in the cost of EUR25 per month. However, in terms of formats, it is already well prepared for corporate use [17]. When you sign up
27%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
exiting the data region, the data from the accelerator is copied back to the host. Table 3 shows a simple example of using the copy  clause. Table 3: The copy  Clause Fortran C !$acc data copy(a
27%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
. Listing 3 Rolling Out the VMs 01 - name: Deploy Backend 02 ec2: 03 key_name: ansible-user-key 04 instance_type: t2.micro 05 image: ami-d15a75c7 06 region: "{{ region }}" 07
27%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
it was successful and will receive a reward. Figure 3: The reinforcement learning approach: An agent (A) interacts with the environment (U), performing actions

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 62 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice