Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (936)
  • Article (270)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 133 Next »

27%
What's new in Samba 4
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Natalia Sheinkin, 123RF.com
to be invoked. [Bug 9651] 6. Windows clients complain that they cannot disable offline caching on the profile share [Bug 7810]. (This is a non-critical message and does not affect operation.) Issues 2 and 3
27%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
integrate existing data sources that are accessible via SMB/CIFS or Novell Core Protocol (NCP), for example, on Windows 2003/2008, Novell Open Enterprise 11 (OES), and NetWare 6.5.8 servers with at least one
27%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
authentication on the basis of text messages. Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
27%
Installing .NET on Linux
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © 36clicks, 123RF.com
. This happened about six months before .NET version 4.6 appeared. These events prepared the way for a larger community to be able to work on pushing development of the framework forward. Pressure from Java
27%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
Developers website [2]. Note that Red Hat offers all of the development tools free of charge [6]. The next step is to install the Vagrant tool from the default Fedora software repository. The accompanying
27%
Data Compression as a CPU Benchmark
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Lucy Baldwin, 123RF.com
methodical with his performance testing, providing a reference library of results for many CPU types [6], and prebuilt binaries of the tool exist for both Linux and Windows. A sampling of the results library
27%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
of software started [6], but the project was discontinued after some time in favor of Vagrant [7]. Vagrant has long enjoyed a good reputation as a manager for virtual machines and is often used to create
27%
Bpytop command-line monitoring tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Filip Mroz on Unsplash
of the tool. In September 2021, he announced a C++ port of the software to Linux called btop++ [6], although the OSX branch is still under development. For this article, I used bpytop because btop++ was not yet
27%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
directly from the repository [6]. The ATT&CK navigator can be used to mark relevant entries during research and to display correlations, thus letting you plan and trace your progress in securing
27%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
filesystems in userspace (FUSEs) have enjoyed a fair amount of popularity [6]). GlusterFS also used this approach, which offers several advantages: Development is not subject to the strict regulations

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice