Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 00 Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (105)
  • Article (46)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »

39%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
| replace "-" "_" }}_PORT_5432_TCP_PORT export PGPASSWORD={{ .Secrets.postgres.Data.password_superuser | toString }} aws s3 cp {{ .ArtifactsIn.cloudObject.KeyValue.path }} backup
39%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Shift or – as shown here – an Ingress route for accessing the AWX service. This strategy also works with MicroK8s or K3s. You might have to adjust the Ingress definition if routers such as Traefik cannot cope
39%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
1 4,423.19 8,100.00 8,012.09 Proxy server subscription 2 4,500.00 3,850.00 4,006.04 Management/Provisioning subscription 2
39%
IPv6 Tables
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © gepard1979, 123RF.com
, from, or through the system is possible, not even loopback traffic (Figure 3). But, because loopback should always be allowed, you add a loopback rule
39%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
to the screen (STDOUT; line 15). Listing 1: SSH Script 01 #!/usr/bin/php 02 22); 05 ssh2_auth_password($ssh, 'khess', 'password'); 06 $stream = ssh2_exec
39%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
) or even be booted in a virtual environment. This virtual boot function is perfect for smaller companies. It lets administrators boot a ShadowProtect image directly in the free VirtualBox [3] environment
39%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
, the MAC address (e.g., 00:11:22:33:44:55) is split down the middle, and two bytes containing FF:FE are inserted. This gives you 64 bits. If the basis is a globally unique address (which should be the case
39%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
Model"; 11 $work = "ebiz-tx"; 12 $node1 = "WebServer"; 13 $node2 = "AppServer"; 14 $node3 = "DBMServer"; 15 $think = 0.0 * 1e-3; # as per test system 16 $dtime = 2.2 * 1e-3; # dummy service time 17 18
39%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8.64 41.79 Table 1: Benchmark Times
39%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
with ; or \g. 03 Your MySQL connection id is 3 to server version 5.0.22 01 Type 'help;' or '\h' for help. Type '\c' to clear the buffer. 01 mysql> Your connection to the MySQL server on the remote Unix

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice