Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 154 Next »

11%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
telemetry." A simple search on "telemetry" [1] brings up a definition like "… the process of recording and transmitting the readings of an instrument." In this case, the instrument is the high
11%
Clone and deploy desktop computers with FOG
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Nikita Rogul, Fotolia.com
click the icon labelled Advanced to bring up a list of several deployment options, such as Test Disk and Password Reset (Figure 6). Select one and then power on the machine to automatically launch
11%
Bpfilter offers a new approach to packet filtering in Linux
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © alphaspirit, 123RF.com
list in recent months. If bpfilter actually works as advertised, Linux admins will quickly adopt it. Bpfilter is just an example of the power that BPF brings to Linux, with the possibility to run
11%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
Every malware attack is different, and every investigation must follow a path based on the evidence, but that doesn't mean you can't bring your incidence response team together in advance and assemble
11%
Making Small Business Server 2011 fit for 2014
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © diego cervo, 123RF.com
wrong. Preparations To bring SBS 2011 Standard up to the current level, you need to install three service packs that update the main system components in the right order: Windows Server 2008 R2
11%
Interview with the MariaDB Foundation board Chairman Eric Herman
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
, has the largest number of experienced developers contributing to the MariaDB codebase. They also have, therefore, the largest impact on what ends up being in the next version. The Foundation brings all
11%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
because of the need to create and destroy the threads. Pymp Because the goal of Pymp is to bring OpenMP-like functionality to Python, Pymp and Python should naturally share some concepts. A single master
11%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
FROM yum_sources WHERE enabled=1; You can bring up an alphabetized list of all installed packages with: SELECT name, version FROM rpm_packages ORDER BY name; To look for a specific package, you can
11%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
of the system, so a user working within the container can't bring down the server or damage other user spaces. We put Docker containers to work on a problem we had on our network: creating workspaces for users
11%
Azure Application Gateway load distribution tool
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © foodandmore, 123RF.com
-increasing threat to web applications that are accessible on the Internet. The aim of such attacks is to bring a system to its knees because of a large volume of requests making the system inaccessible for legitimate

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice