Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 133 Next »

16%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
in a future version. Numeric typing is straightforward, with just number , which largely corresponds to a floating-point number (float) in other languages. In particular, Lua has no integer variable type
16%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
to reference these rather than look up firewall rules (for greater efficiency, I suppose), so it can say that an IP address is “already banned” if a returning IP address comes back at some point in the future
16%
Five HPC Pitfalls – Part 2
09.04.2012
Home »  HPC  »  Articles  » 
some form of acceptance testing for the cluster to ensure that it is working properly. Qualified vendors should be able to answer pointed HPC questions. If they cannot, a pitfall could lie ahead
16%
MySQL as a Service
21.12.2012
Home »  CloudAge  »  Articles  » 
 
you’ve planned it very well, at a certain point, you have to get a low-level connection and see your data. Scaling is done by simply running: dotcloud scale myapp data:instances=5 This is pretty
16%
Managing Virtual Infrastructures
21.01.2013
Home »  Articles  » 
 
: The structure of a virtual environment in oVirt. A complex role and authorization schema allows the administrator to delegate administrative tasks. The entry point for this is the “Configure” link
16%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
to the host computer, so its use will be limited in all but the most secure companies. W2G is interesting, however, from a purely technical point of view: Now Windows-oriented folks can use a complete, familiar
16%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
to the Installation Options , and, in my test, Anaconda pointed out there that there was enough free space on the freshly created virtual SCSI disk for automatic partitioning. If you want to partition manually, you
16%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
;security=low do you want to test this form? [Y/n/q] After a successful scan, SQLmap presents the potential attack vectors in the form of prebuilt SQL statements. At that point, the user can decide whether
16%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
). Figure 2: Protocols and programs manage communication with the outside world. Because any program can send connection requests in the default setting, this point relates in particular to incoming
16%
Configuration Management with puppet
30.04.2013
Home »  Articles  » 
 
’t want it. Now I’m going to create a document root and put an HTML page in it. This could be your app or just a holding page, but it gives you a starting point. file { '/var

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice