Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 Next »

7%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
for the infrastructure services is simple in its final form – even if the configuration for GRUB and Kickstart can be generated automatically by Ansible. DHCP and TFTP Rollout Now it's time to get down to business
7%
Open source monitoring with Zabbix
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Vincentiu Solomon on Unsplash
the corresponding user macro for this trigger function as shown in Figure 8. You always need to specify the item referenced in a trigger definition with its item key. The key uniquely identifies each item on a host
7%
High-Performance Python 2
22.08.2019
Home »  HPC  »  Articles  » 
 = a * b and save the Fortran integer addition code in file add.f90 : integer function addtwo(a, b)     integer, intent(in) :: a, b     addtwo = a + b end function addtwo You should compile each function
7%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
= a * b and save the Fortran integer addition code in file add.f90: integer function addtwo(a, b) integer, intent(in) :: a, b addtwo = a + b end function addtwo You should compile each function
7%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
the Program Now it is time to run the program inside a gdb session and exploit it. The goal is to get a shell right before the program ends execution. However, you don't want the program to crash. The first
7%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
-premises to cloud or vice versa, and so on, now might be a good time to schedule that move. You're likely going to have to schedule significant testing and downtime, so there may be an efficiency benefit to doing
7%
The new OpenShift version 4
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Artem Egorov, 123RF.com
with new features and far better than all its predecessors together – if you believe Red Hat's PR department. However, does the product deliver what the manufacturer promises? How does OpenShift fit
7%
Storage protocols for block, file, and object storage
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo Johannes Plenio on Unsplash
volumes in the double-digit multi-petabyte or exabyte range. For this reason, development in the direction of clustered scale-out filesystems has been going on for some time. In general, high
7%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
). Figure 7: The calendar on an iPad. iRony helps owners of Apple devices connect to Kolab the first time. Listing 4 kolab-caldav-vhost.conf 01 02 ServerName caldav.yourkolab.com
7%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
. In some cases, Windows system files are destroyed so that Windows still boots, but errors appear or some features fail to launch. In this case, you can either go back to a system restore point or call

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice